咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy Attribute-based Encryption"
99 条 记 录,以下是71-80 订阅
排序:
attribute Revocable attribute-based encryption for Decentralized Disruption-Tolerant Military Networks  3
Attribute Revocable Attribute-Based Encryption for Decentral...
收藏 引用
3rd International Symposium on Computing and Networking (CANDAR)
作者: Nomura, Kenta Mohri, Masami Ii, Yoshiaki Si Iiraisi Morii, Masakatu Kobe Univ Kobe Hyogo 6578501 Japan Gifu Univ Gifu 5011193 Japan
Disruption-tolerant network technologies are becoming solutions to access the confidential information or command by exploiting external storage node. It is necessary to encrypt the shared data to prevent illegal acce... 详细信息
来源: 评论
attribute-based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing  7
Attribute-Based Weighted Keyword Search Scheme Supporting Mu...
收藏 引用
7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud) / 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
作者: Wang, Shulan Li, Yuan Wang, Haiyan Zhang, Xi Chen, Jianyong Shenzhen Univ Coll Comp Sci & Software Engn Shenzhen Peoples R China Shenzhen Technol Univ Coll Big Data & Internet Shenzhen Peoples R China Peng Cheng Lab Cyberspace Secur Res Ctr Shenzhen Peoples R China
With the popularity of intelligent terminal, fog computing as a new generation of internet technology can integrate the computing power of terminals and improve the effective utilization of social resources. At the sa... 详细信息
来源: 评论
attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage  20
Attribute-based encryption scheme supporting decryption outs...
收藏 引用
20th IEEE International Conference on Computational Science and Engineering (CSE) / 15th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)
作者: Liu, Hongwei Zhu, Ping Chen, Zehong Zhang, Peng Jiang, Zoe L. Shenzhen Univ Coll Informat Engn Shenzhen Peoples R China Shenzhen Univ Coll Informat Engn ATR Key Lab Natl Def Technol Shenzhen Peoples R China Harbin Insititute Technol Shenzhen Grad Sch Shenzhen Peoples R China Guangdong Prov Key Lab High Performance Comp Guangzhou Guangdong Peoples R China
Aiming to reduce the user's computational overhead and tackle the attribute revocation issue, an attribute-based encryption scheme supporting decryption outsourcing and attribute revocation is proposed in this pap... 详细信息
来源: 评论
A Secure Image-Video Retrieval Scheme with attribute-based encryption and Multi-feature Fusion in Smart Grid
A Secure Image-Video Retrieval Scheme with Attribute-Based E...
收藏 引用
4th International Conference on Science of Cyber Security (SciSec)
作者: Dang, Qian Zhao, Bo Sun, Biying Qiu, Yu Du, Chunhui State Grid Gansu Informat & Telecommun Co Lanzhou 730050 Peoples R China State Grid Gansu Elect Power Co Lanzhou 730000 Peoples R China
With the continuous development of smart grid, massive sensitive videos of power grid are stored in semi-trusted cloud servers, which leads to various security threats. And the existing secure video retrieval solution... 详细信息
来源: 评论
Expressive CP-ABE with Partially Hidden Access Structures  12
Expressive CP-ABE with Partially Hidden Access Structures
收藏 引用
7th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
作者: Lai, Junzuo Deng, Robert H. Li, Yingjiu Singapore Management Univ Sch Informat Syst Singapore Singapore
In a traditional ciphertext-policy attribute-based encryption (CP-ABE) scheme, an access structure, also refereed to as ciphertext-policy, is sent along with a ciphertext explicitly, and anyone who obtains a ciphertex... 详细信息
来源: 评论
A Blockchain-based Access Control System for Cloud Storage
A Blockchain-Based Access Control System for Cloud Storage
收藏 引用
IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus)
作者: Sukhodolskiy, Ilya Zapechnikov, Sergey Natl Res Nucl Univ MEPhI Dept Cryptol & Cybersecur Moscow Engn Phys Inst Moscow Russia
In this paper, we present a prototype of multi-user system for access control to datasets stored in an untrusted cloud environment. Cloud storage like any other untrusted environment needs the ability to secure share ... 详细信息
来源: 评论
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
Multi-authority attribute-based encryption scheme with const...
收藏 引用
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)
作者: Zhang, Xiao Wu, Faguo Yao, Wang Wang, Zhao Wang, Wenhua Beihang Univ Sch Math & Syst Sci Beijing 100191 Peoples R China Beihang Univ Ecole Cent Pekin Sino French Engineer Sch Beijing Peoples R China Minist Educ Key Lab Math Informat & Behav Semant Beijing Peoples R China Beihang Univ Beijing Adv Innovat Ctr Big Data & Brain Comp Beijing Peoples R China AVIC Econ & Technol Res Estab Beijing Peoples R China
ciphertext-policy attribute-based encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage system. It gives data owners direct and flexible control on access po... 详细信息
来源: 评论
Insecurity of an Dynamic User Revocation and Key Refreshing for attribute-based encryption Scheme  10
Insecurity of an Dynamic User Revocation and Key Refreshing ...
收藏 引用
10th International Conference on Computational Intelligence and Security CIS 2014
作者: Wang, Changji Lin, Haitao Xu, Xilei Zheng, Kangjia Xia, Xiaonan Yunnan Univ Natl Pilot Sch Software Kunming Peoples R China Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou Guangdong Peoples R China
Cloud computing has generated a major impact on the global IT ecosystem, which promises economic advantages, speed, agility, flexibility, virtually infinite elasticity and innovation. However, data security and privac... 详细信息
来源: 评论
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NE...
收藏 引用
4th IEEE International Conference on Broadband Network and Multimedia Technology (IEEE IC-BNMT 2011)
作者: Chen, Chen Huang, Zheng Wen, Qiaoyan Fan, Yajun Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
The key management of wireless sensor networks is one of the most important research topics for the secure communications. In light of the unique characteristics in Wireless sensor network such as large scale of deplo... 详细信息
来源: 评论
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE  12th
TATIS: Trustworthy APIs for Threat Intelligence Sharing with...
收藏 引用
12th International Symposium on Foundations and Practice of Security (FPS)
作者: Preuveneers, Davy Joosen, Wouter Katholieke Univ Leuven Imec DistriNet Celestijnenlaan 200A B-3001 Heverlee Belgium
Threat intelligence platforms offer cyber emergency teams and security stakeholders access to sightings of cyberthreats and indicators of compromise. Given the sensitivity of the information, access may be restricted ... 详细信息
来源: 评论