咨询与建议

限定检索结果

文献类型

  • 652 篇 期刊文献
  • 390 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 1,045 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,013 篇 工学
    • 889 篇 计算机科学与技术...
    • 379 篇 电气工程
    • 301 篇 信息与通信工程
    • 179 篇 软件工程
    • 56 篇 电子科学与技术(可...
    • 52 篇 网络空间安全
    • 33 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 6 篇 机械工程
    • 6 篇 土木工程
    • 5 篇 石油与天然气工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 测绘科学与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 动力工程及工程热...
  • 94 篇 理学
    • 57 篇 数学
    • 32 篇 化学
    • 27 篇 生物学
    • 6 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
  • 50 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
    • 3 篇 公共管理
  • 15 篇 军事学
    • 15 篇 军队指挥学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 心理学(可授教育学...
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 1,045 篇 attribute-based ...
  • 257 篇 access control
  • 177 篇 cloud computing
  • 100 篇 blockchain
  • 73 篇 encryption
  • 72 篇 security
  • 64 篇 multi-authority
  • 60 篇 data sharing
  • 50 篇 revocation
  • 50 篇 searchable encry...
  • 49 篇 cloud storage
  • 49 篇 privacy
  • 45 篇 internet of thin...
  • 40 篇 cryptography
  • 37 篇 proxy re-encrypt...
  • 34 篇 ciphertext-polic...
  • 32 篇 fine-grained acc...
  • 32 篇 outsourced decry...
  • 28 篇 servers
  • 27 篇 fog computing

机构

  • 27 篇 xian univ posts ...
  • 24 篇 xidian univ sch ...
  • 21 篇 xidian univ stat...
  • 20 篇 state key lab cr...
  • 19 篇 chinese acad sci...
  • 17 篇 westone cryptol ...
  • 15 篇 xidian univ stat...
  • 14 篇 xidian univ sch ...
  • 13 篇 univ elect sci &...
  • 12 篇 singapore manage...
  • 11 篇 shanghai jiao to...
  • 11 篇 guangzhou univ s...
  • 11 篇 beijing univ pos...
  • 11 篇 beijing univ pos...
  • 9 篇 hohai univ coll ...
  • 9 篇 fuzhou univ coll...
  • 9 篇 univ elect sci &...
  • 9 篇 natl inst adv in...
  • 8 篇 guangzhou univ s...
  • 7 篇 xian univ techno...

作者

  • 26 篇 susilo willy
  • 24 篇 zhang yinghui
  • 19 篇 zheng dong
  • 19 篇 huang qinlong
  • 17 篇 mu yi
  • 17 篇 yang yixian
  • 17 篇 liu ximeng
  • 15 篇 li hui
  • 14 篇 deng robert h.
  • 14 篇 ning jianting
  • 13 篇 li jin
  • 13 篇 zhang leyou
  • 13 篇 chen xiaofeng
  • 12 篇 cao zhenfu
  • 12 篇 attrapadung nutt...
  • 11 篇 wang guojun
  • 11 篇 liang kaitai
  • 11 篇 zhang rui
  • 11 篇 liu zhenhua
  • 11 篇 li jiguo

语言

  • 1,026 篇 英文
  • 12 篇 其他
  • 8 篇 中文
检索条件"主题词=Attribute-based Encryption"
1045 条 记 录,以下是51-60 订阅
排序:
Generic Construction of Adaptively Secure Anonymous Key-Policy attribute-based encryption from Public-Key Searchable encryption
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2020年 第1期E103A卷 107-113页
作者: Hayata, Junichiro Ishizaka, Masahito Sakai, Yusuke Hanaoka, Goichiro Matsuura, Kanta Univ Tokyo Tokyo 1538505 Japan Natl Inst Adv Ind Sci & Technol Tokyo 1350064 Japan KDDI Res Inc Publ Key Cryptosyst Fujimino Japan
Public-key encryption with keyword search (PEKS) is a cryptographic primitive that allows us to search for particular keywords over ciphertexts without recovering plaintexts. By using PEKS in cloud services, users can... 详细信息
来源: 评论
Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating
收藏 引用
Science China(Information Sciences) 2016年 第4期59卷 187-202页
作者: Zuobin YING Hui LI Jianfeng MA Junwei ZHANG Jiangtao CUI School of Computer Science and Technology Xidian University
attribute-based encryption(ABE) is a promising new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud. With the help of ABE, the majority of security issues ... 详细信息
来源: 评论
Multiauthority attribute-based encryption With Dynamic Membership From Lattices
收藏 引用
IEEE ACCESS 2022年 10卷 58254-58267页
作者: Zhuang, Er-Shuo Fan, Chun-, I Kuo, I-Hua Natl Sun Yat Sen Univ Dept Comp Sci & Engn Kaohsiung 80424 Taiwan
attribute-based encryption is useful for one-to-many encrypted message sending. However, most attribute-based encryption schemes authorize and issue attributes to users by a single authority. Such a scenario conflicts... 详细信息
来源: 评论
A survey on multi-authority and decentralized attribute-based encryption
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2022年 第1期13卷 515-533页
作者: Oberko, Prince Silas Kwesi Obeng, Victor-Hillary Kofi Setornyo Xiong, Hu Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Peoples R China
The introduction of attribute-based encryption (ABE) targets to achieve the implementation of single-to-numerous encryption;however, the sole authority challenge and the issue of distributed management of attributes a... 详细信息
来源: 评论
Efficient attribute-based encryption with attribute revocation for assured data deletion
收藏 引用
INFORMATION SCIENCES 2019年 479卷 640-650页
作者: Xue, Liang Yu, Yong Li, Yannan Au, Man Ho Du, Xiaojiang Yang, Bo Shaanxi Normal Univ Sch Comp Sci Xian 710062 Shaanxi Peoples R China Univ Wollongong Sch Comp & Informat Technol Inst Cybersecur & Cryptol Wollongong NSW 2522 Australia Hong Kong Polytech Univ Dept Comp Hong Kong Peoples R China Temple Univ Dept Comp & Informat Sci Philadelphia PA 19122 USA
Cloud storage allows customers to store their data on remote cloud servers. With the advantage of reducing the burden of data management and storage, an increasing number of users prefer to store their data on the clo... 详细信息
来源: 评论
Improvement of an outsourced attribute-based encryption scheme
收藏 引用
SOFT COMPUTING 2019年 第22期23卷 11409-11417页
作者: Chen, Hongjie Liao, Yongjian Univ Elect Sci & Technol China Chengdu Sichuan Peoples R China
attribute-based encryption (ABE) scheme has become an important technology in cryptography. However, the considerable overhead of encryption and decryption restricts its application on the devices with limited resourc... 详细信息
来源: 评论
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
收藏 引用
INFORMATION SCIENCES 2015年 295卷 221-231页
作者: Shi, Yanfeng Zheng, Qingji Liu, Jigiang Han, Zhen Beijing Jiaotong Univ Sch Comp & Informat Technol Beijing 100044 Peoples R China Univ Texas San Antonio Dept Comp Sci San Antonio TX USA
attribute-based encryption (ABE) enables an access control mechanism by specifying access control policies among decryption keys and ciphertexts. In this paper, we propose a novel ABE variant, dubbed directly revocabl... 详细信息
来源: 评论
A lightweight and scalable attribute-based encryption system for smart cities
收藏 引用
COMPUTER COMMUNICATIONS 2020年 149卷 78-89页
作者: Rasori, Marco Perazzo, Pericle Dini, Gianluca Univ Pisa Dept Informat Engn Pisa Italy
In the near future, a technological revolution will involve our cities, where a variety of smart services based on the Internet of Things will be developed to facilitate the needs of the citizens. Sensing devices are ... 详细信息
来源: 评论
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2016年 第17期9卷 4138-4150页
作者: Wang, Qihua Yu, Chang Wu Li, Fagen Wang, Huaqun Cao, Lijie Dalian Ocean Univ Dept Informat Engn Dalian 116023 Peoples R China Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Peoples R China Chung Hua Univ Dept Comp Sci & Informat Engn Hsinchu 300 Taiwan Nanjing Univ Posts & Telecommun Coll Comp Nanjing 210003 Jiangsu Peoples R China
Outsourcing decryption that enables the authorized users to obtain the original data without decryption computation is crucially important for wireless sensor networks in public data center. The existing outsourcing d... 详细信息
来源: 评论
Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices
收藏 引用
COMPUTER COMMUNICATIONS 2019年 145卷 113-125页
作者: Malluhi, Q. M. Shikfa, A. Tran, V. D. Trinh, V. C. Qatar Univ Coll Engn Doha Qatar Hanoi Univ Sci & Technol Hanoi Vietnam Hong Duc Univ Thanh Hoa Vietnam
In a traditional attribute-based encryption (ABE) system, there is only one central authority who generates and hence knows the secret keys of all users, this problem is known as the key escrow problem. An ABE scheme ... 详细信息
来源: 评论