咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy Attribute-based Encryption"
99 条 记 录,以下是91-100 订阅
排序:
Fine-grained Database Field Search Using attribute-based encryption for E-Healthcare Clouds
收藏 引用
JOURNAL OF MEDICAL SYSTEMS 2016年 第11期40卷 235-235页
作者: Guo, Cheng Zhuang, Ruhan Jie, Yingmo Ren, Yizhi Wu, Ting Choo, Kim-Kwang Raymond Dalian Univ Technol Sch Software Technol Dalian Peoples R China Key Lab Ubiquitous Network & Serv Software Liaoni Dalian Peoples R China Hangzhou Dianzi Univ Sch Cyberspace Hangzhou Zhejiang Peoples R China Hangzhou Dianzi Univ Minist Educ China Key Lab Complex Syst Modeling & Simulat Hangzhou Zhejiang Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX USA Univ South Australia Sch Informat Technol & Math Sci Adelaide SA Australia China Univ Geosci Sch Comp Sci Wuhan Peoples R China
An effectively designed e-healthcare system can significantly enhance the quality of access and experience of healthcare users, including facilitating medical and healthcare providers in ensuring a smooth delivery of ... 详细信息
来源: 评论
An Access Control Model for Cloud Storage Using attribute-based encryption
An Access Control Model for Cloud Storage Using Attribute-Ba...
收藏 引用
IEEE Russia Section Young Researchers in Electrical and Electronic Engineering Conference (EIConRus)
作者: Sukhodolskiy, Ilya A. Zapechnikov, Sergey V. Natl Res Nucl Univ MEPhI Moscow Engn Phys Inst Dept Cryptol & Cybersecur Moscow Russia
In this work, we present a prototype of multi-user system for access control to datasets stored in a cloud. In the system, each user is assigned a set of attributes that characterize his identity in the system. The en... 详细信息
来源: 评论
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NE...
收藏 引用
2011 4th IEEE International Conference on Broadband Network & Multimedia Technology(第四届IEEE宽带网络与多媒体国际会议 4th IEEE IC-BNMT2011)
作者: Chen Chen Zheng Huang Qiaoyan Wen Yajun Fan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
The key management of wireless sensor networks is one of the most important research topics for the secure communications. In light of the unique characteristics in Wireless sensor network such as large scale of deplo... 详细信息
来源: 评论
attribute-based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing
Attribute-Based Weighted Keyword Search Scheme Supporting Mu...
收藏 引用
IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)
作者: Shulan Wang Yuan Li Haiyan Wang Xi Zhang Jianyong Chen College of Big Data and Internet Shenzhen University Shenzhen P.R. China College of Computer Science and Software Engineering Shenzhen University Shenzhen P.R. China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen P.R. China
With the popularity of intelligent terminal, fog computing as a new generation of internet technology can integrate the computing power of terminals and improve the effective utilization of social resources. At the sa... 详细信息
来源: 评论
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NE...
收藏 引用
2011 4th IEEE International Conference on Broadband Network and Multimedia Technology
作者: Chen Chen Zheng Huang Qiaoyan Wen Yajun Fan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
The key management of wireless sensor networks is one of the most important research topics for the secure *** light of the unique characteristics in Wireless sensor network such as large scale of deployment,mobility ... 详细信息
来源: 评论
Multi-keyword Ranked Searchable encryption Supporting CP-ABE Test
Multi-keyword Ranked Searchable Encryption Supporting CP-ABE...
收藏 引用
IEEE International Conference on Computing, Communications and IoT Applications
作者: Chuxin Wu Hongwei Liu Peng Zhang Yuhong Liu ATR Key Laboratory of National Defense Technology College of Electronics and Information Engineering Shenzhen University Shenzhen Technology University Department of Computer Engineering Santa Clara University
Internet of Things (IoT) and cloud computing are promising technologies that change the way people communicate and live. As the data collected through IoT devices often involve users' private information and the c... 详细信息
来源: 评论
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2019年 第21期31卷
作者: Zhang, Xiao Wu, Faguo Yao, Wang Wang, Zhao Wang, Wenhua Beihang Univ Sch Math & Syst Sci Beijing 100191 Peoples R China Beihang Univ Ecole Cent Pekin Sino French Engineer Sch Beijing Peoples R China Minist Educ Key Lab Math Informat & Behav Semant Beijing Peoples R China Beihang Univ Beijing Adv Innovat Ctr Big Data & Brain Comp Beijing Peoples R China AVIC Econ & Technol Res Estab Beijing Peoples R China
ciphertext-policy attribute-based encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage system. It gives data owners direct and flexible control on access po... 详细信息
来源: 评论
AC-AC: Dynamic revocable access control for acute care teams to access medical records
收藏 引用
Smart Health 2021年 20卷
作者: T. de Oliveira, Marcela Dang, Hai-Van A. Reis, Lúcio H. Marquering, Henk A. D. Olabarriaga, Sílvia Amsterdam University Medical Centers – University of Amsterdam Amsterdam Netherlands University of Westminster London United Kingdom
Acute care demands the collaboration of multiple healthcare professionals and various organisations. During an emergency, the availability of Electronic Medical Records (EMR) allows acute care teams to access a patien... 详细信息
来源: 评论
Secure Blockchain Assisted attribute-based Keyword Search for Collaborative E-Healthcare
收藏 引用
Distributed Ledger Technologies: Research and Practice 1000年
作者: Kasturi Routray Abhiram Manikonda Padmalochan Bera Indian Institute of Technology Bhubaneswar India
In the age of technological advancement, collaborative E-healthcare emerges as a transformative system eliminating traditional location and accessibility barriers in healthcare services. Here, Searchable encryption (S... 详细信息
来源: 评论