咨询与建议

限定检索结果

文献类型

  • 652 篇 期刊文献
  • 390 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 1,045 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,013 篇 工学
    • 889 篇 计算机科学与技术...
    • 379 篇 电气工程
    • 301 篇 信息与通信工程
    • 179 篇 软件工程
    • 56 篇 电子科学与技术(可...
    • 52 篇 网络空间安全
    • 33 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 6 篇 机械工程
    • 6 篇 土木工程
    • 5 篇 石油与天然气工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 测绘科学与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 动力工程及工程热...
  • 94 篇 理学
    • 57 篇 数学
    • 32 篇 化学
    • 27 篇 生物学
    • 6 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
  • 50 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
    • 3 篇 公共管理
  • 15 篇 军事学
    • 15 篇 军队指挥学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 心理学(可授教育学...
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 1,045 篇 attribute-based ...
  • 257 篇 access control
  • 177 篇 cloud computing
  • 100 篇 blockchain
  • 73 篇 encryption
  • 72 篇 security
  • 64 篇 multi-authority
  • 60 篇 data sharing
  • 50 篇 revocation
  • 50 篇 searchable encry...
  • 49 篇 cloud storage
  • 49 篇 privacy
  • 45 篇 internet of thin...
  • 40 篇 cryptography
  • 37 篇 proxy re-encrypt...
  • 34 篇 ciphertext-polic...
  • 32 篇 fine-grained acc...
  • 32 篇 outsourced decry...
  • 28 篇 servers
  • 27 篇 fog computing

机构

  • 27 篇 xian univ posts ...
  • 24 篇 xidian univ sch ...
  • 21 篇 xidian univ stat...
  • 20 篇 state key lab cr...
  • 19 篇 chinese acad sci...
  • 17 篇 westone cryptol ...
  • 15 篇 xidian univ stat...
  • 14 篇 xidian univ sch ...
  • 13 篇 univ elect sci &...
  • 12 篇 singapore manage...
  • 11 篇 shanghai jiao to...
  • 11 篇 guangzhou univ s...
  • 11 篇 beijing univ pos...
  • 11 篇 beijing univ pos...
  • 9 篇 hohai univ coll ...
  • 9 篇 fuzhou univ coll...
  • 9 篇 univ elect sci &...
  • 9 篇 natl inst adv in...
  • 8 篇 guangzhou univ s...
  • 7 篇 xian univ techno...

作者

  • 26 篇 susilo willy
  • 24 篇 zhang yinghui
  • 19 篇 zheng dong
  • 19 篇 huang qinlong
  • 17 篇 mu yi
  • 17 篇 yang yixian
  • 17 篇 liu ximeng
  • 15 篇 li hui
  • 14 篇 deng robert h.
  • 14 篇 ning jianting
  • 13 篇 li jin
  • 13 篇 zhang leyou
  • 13 篇 chen xiaofeng
  • 12 篇 cao zhenfu
  • 12 篇 attrapadung nutt...
  • 11 篇 wang guojun
  • 11 篇 liang kaitai
  • 11 篇 zhang rui
  • 11 篇 liu zhenhua
  • 11 篇 li jiguo

语言

  • 1,026 篇 英文
  • 12 篇 其他
  • 8 篇 中文
检索条件"主题词=Attribute-based Encryption"
1045 条 记 录,以下是61-70 订阅
排序:
Securely Outsourcing attribute-based encryption with Checkability
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2014年 第8期25卷 2201-2210页
作者: Li, Jin Huang, Xinyi Li, Jingwei Chen, Xiaofeng Xiang, Yang Guangzhou Univ Sch Comp Sci Guangzhou Peoples R China Xidian Univ State Key Lab Integrated Serv Networks ISN Xian Peoples R China Fujian Normal Univ Sch Math & Comp Sci Fujian Prov Key Lab Network Secur & Cryptol Fuzhou Peoples R China Nankai Univ Coll Informat Tech Sci Tianjin Peoples R China Deakin Univ Sch Informat Technol Geelong Vic 3217 Australia
attribute-based encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational comp... 详细信息
来源: 评论
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud
收藏 引用
JOURNAL OF SUPERCOMPUTING 2020年 第7期76卷 4884-4903页
作者: Guo, Rui Li, Xiong Zheng, Dong Zhang, Yinghui Xian Univ Posts & Telecommun Natl Engn Lab Wireless Secur Xian 710121 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Hunan Univ Sci & Technol Sch Comp Sci & Engn Xiangtan 411201 Peoples R China Westone Cryptol Res Ctr Beijing 100070 Peoples R China
In the personal health record (PHR) system, the patient's health records are usually outsourced to a large database, such as the cloud service provider. In order to guarantee the confidentiality of this data , ach... 详细信息
来源: 评论
Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第14期82卷 22251-22274页
作者: Deng, Shijie Yang, Gaobo Dong, Wen Xia, Ming Hunan Univ Sch Informat Sci & Elect Engn Changsha 410082 Peoples R China
attribute-based encryption (ABE) is a promising approach to enables fine-grained access control for encrypted data in cloud storage. However, to design a flexible and effective revocation mechanism has always been a t... 详细信息
来源: 评论
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
收藏 引用
THEORETICAL COMPUTER SCIENCE 2018年 723卷 51-72页
作者: Canard, S. Phan, D. H. Pointcheval, D. Trinh, V. C. Orange Labs Appl Crypto Grp Caen France Univ Limoges Limoges France PSL Res Univ CNRS Dept Informat ENS F-75005 Paris France Hong Duc Univ Thanh Hoa Vietnam INRIA Le Chesnay France
Standard Broadcast encryption (BE) and attribute-based encryption (ABE) aim at sending a content to a large arbitrary group of users at once. Regarding Broadcast encryption, currently, the most efficient schemes provi... 详细信息
来源: 评论
Practical attribute-based encryption: Traitor Tracing, Revocation and Large UniverseaEuro
收藏 引用
COMPUTER JOURNAL 2016年 第7期59卷 983-1004页
作者: Liu, Zhen Wong, Duncan S. ASTRI Secur & Data Sci Hong Kong Hong Kong Peoples R China
A blackbox traceable attribute-based encryption (ABE) can identify a malicious user called traitor, which created a decryption box with respect to an attribute set (respectively, access policy), out of all the users w... 详细信息
来源: 评论
Cost-Efficient Outsourced Decryption of attribute-based encryption Schemes for Both Users and Cloud Server in Green Cloud Computing
收藏 引用
IEEE ACCESS 2020年 8卷 20862-20869页
作者: Liao, Yongjian Zhang, Ganglin Chen, Hongjie Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Peoples R China
To reduce a user's decryption cost and protect the private information from being leaked, Green et al. proposed an approach oursourcing the decryption of the attribute based encryption (ABE) scheme to the cloud se... 详细信息
来源: 评论
A Novel attribute-based encryption Approach with Integrity Verification for CAD Assembly Models
收藏 引用
Engineering 2021年 第6期7卷 787-797页
作者: Yueting Yang Fazhi He Soonhung Han Yaqian Liang Yuan Cheng School of Computer Science Wuhan UniversityWuhan 430072China State Key Laboratory of Digital Manufacturing Equipment and Technology Huazhong University of Science and TechnologyWuhan 430074China Division of Ocean Engineering Korea Advanced Institute of Science and TechnologyDaejeon 34141Republic of Korea School of Information Management Wuhan UniversityWuhan 430072China
Cloud manufacturing is one of the three key technologies that enable intelligent *** paper presents a novel attribute-based encryption(ABE)approach for computer-aided design(CAD)assembly models to effectively support ... 详细信息
来源: 评论
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2018年 108卷 112-123页
作者: Liu, Zechao Jiang, Zoe L. Wang, Xuan Yiu, S. M. Harbin Inst Technol Shenzhen Grad Sch Shenzhen 518055 Peoples R China Univ Hong Kong Hong Kong Hong Kong Peoples R China
attribute-based encryption (ABE) offers fine-grained access control policy over encrypted data, and thus applicable in cloud storage to provide authorized data privacy. However, there are some issues that should be so... 详细信息
来源: 评论
An Efficient File Hierarchy attribute-based encryption Scheme in Cloud Computing
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2016年 第6期11卷 1265-1277页
作者: Wang, Shulan Zhou, Junwei Liu, Joseph K. Yu, Jianping Chen, Jianyong Xie, Weixin Shenzhen Univ Coll Informat Engn ATR Key Lab Natl Def Technol Shenzhen 518060 Peoples R China Wuhan Univ Technol Sch Comp Sci & Technol Hubei Key Lab Transportat Internet Things Wuhan 430070 Peoples R China Monash Univ Fac Informat Technol Clayton Vic 3800 Australia Shenzhen Univ Coll Comp & Software Engn Shenzhen 518060 Peoples R China
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the cha... 详细信息
来源: 评论
Revocable Blockchain-Aided attribute-based encryption With Escrow-Free in Cloud Storage
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2023年 第7期72卷 1901-1912页
作者: Guo, Yuyan Lu, Zhenhua Ge, Hui Li, Jiguo Huaibei Normal Univ Coll Comp Sci & Technol Huaibei 235000 Anhui Peoples R China Fujian Normal Univ Coll Math & Informat Fuzhou 350117 Fujian Peoples R China
The massive amount of data generated by the Internet of Things (IoT) and the need to store that data presents a huge challenge for storage. However, meeting this challenge has also driven the development of storage te... 详细信息
来源: 评论