咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy attribute-based encryption"
99 条 记 录,以下是1-10 订阅
排序:
ciphertext-policy attribute-based encryption with Short Keys
收藏 引用
Chinese Journal of Electronics 2014年 第4期23卷 655-660页
作者: XU Peng TANG Yong JIANG Wenbin JIN Hai ZOU Deqing Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
ciphertext-policy attribute-based encryption(CP-ABE)allows a user with some attributes to decrypt the ciphertexts associated with these *** several CP-ABE schemes with the constant size ciphertext were proposed to red... 详细信息
来源: 评论
ciphertext-policy attribute-based encryption for General Circuits from Bilinear Maps
收藏 引用
Wuhan University Journal of Natural Sciences 2017年 第2期22卷 171-177页
作者: HU Peng GAO Haiying School of Information Security Zhengzhou Information and Technology Institute Zhengzhou 450004 Henan China
In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficien... 详细信息
来源: 评论
Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
收藏 引用
Science China(Information Sciences) 2023年 第7期66卷 130-146页
作者: Dilxat GHOPUR Jianfeng MA Xindi MA Yinbin MIAO Jialu HAO Tao JIANG School of Cyber Engineering Xidian University Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Xi'an Satellite Control Center
With the rapid deployment of storage services, secure and efficient user authorization and revocation data shared through the cloud have become a grand challenge hindering cloud data *** previous direct and indirect u... 详细信息
来源: 评论
Reversible Data Hiding Algorithm in Encrypted Images based on Adaptive Median Edge Detection and ciphertext-policy attribute-based encryption
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1123-1155页
作者: Zongbao Jiang Minqing Zhang Weina Dong Chao Jiang Fuqiang Di Key Laboratory of Network and Information Security of People’s Armed Police Chinese People’s Armed Police Force Engineering UniversityXi’an710086China
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... 详细信息
来源: 评论
An Efficient ciphertext-policy attribute-based encryption Scheme with policy Update
收藏 引用
Computers, Materials & Continua 2020年 第5期63卷 1031-1041页
作者: Changji Wang Yuan Yuan School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Mathematics and Statistics Guangdong University of Foreign StudiesGuangzhou510006China
ciphertext-policy attribute-based encryption(CP-ABE)is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the ***,when applying CP-ABE to data outsourcin... 详细信息
来源: 评论
Efficient and Secure ciphertext-policy attribute-based encryption Without Pairing for Cloud-Assisted Smart Grid
收藏 引用
IEEE ACCESS 2020年 8卷 40704-40713页
作者: Wang, Yong Chen, Biwen Li, Lei Ma, Qiang Li, Huicong He, Debiao State Grid Shandong Elect Power Co Jinan 250001 Peoples R China Wuhan Univ Sch Comp Sci Wuhan 430072 Peoples R China Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Peoples R China
Cloud-assisted smart grid has been broadly deployed to improve the economics, efficiency, sustainability, and reliability of electricity services. The new revolution of technology will also bring new challenges to dat... 详细信息
来源: 评论
A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2020年 第3-4期75卷 103-119页
作者: de Oliveira, Marcela T. Bakas, Alexandros Frimpong, Eugene Groot, Adrien E. D. Marquering, Henk A. Michalas, Antonis Olabarriaga, Silvia D. Univ Amsterdam Amsterdam Univ Med Ctr Amsterdam Netherlands Tampere Univ Tampere Finland
In emergency care, fast and efficient treatment is vital. The availability of Electronic Medical Records (EMR) allows healthcare professionals to access a patient's data promptly, which facilitates the decision-ma... 详细信息
来源: 评论
A ciphertext-policy attribute-based encryption based on an Ordered Binary Decision Diagram
收藏 引用
IEEE ACCESS 2017年 5卷 1137-1145页
作者: Li, Long Gu, Tianlong Chang, Liang Xu, Zhoubo Liu, Yining Qian, Junyan Guilin Univ Elect Technol Sch Electromech Engn Guilin 541004 Peoples R China Guilin Univ Elect Technol Guangxi Expt Ctr Informat Sci Guilin 541004 Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Trusted Software Guilin 541004 Peoples R China
ciphertext-policy attribute-based encryption (CP- ABE) is widely used in many cyber physical systems and the Internet of things for guaranteeing information security. In order to improve the performance and efficiency... 详细信息
来源: 评论
Verifiable Outsourced ciphertext-policy attribute-based encryption for Mobile Cloud Computing
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2017年 第6期11卷 3254-3272页
作者: Zhao, Zhiyuan Wang, Jianhua Zhengzhou Informat Sci & Technol Inst Zhengzhou 450001 Henan Peoples R China
With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. attribute-based encryption, widely applied in clou... 详细信息
来源: 评论
An Efficient Pairing-Free ciphertext-policy attribute-based encryption Scheme for Internet of Things
收藏 引用
SENSORS 2024年 第21期24卷 6843页
作者: Guo, Chong Gong, Bei Waqas, Muhammad Alasmary, Hisham Tu, Shanshan Chen, Sheng Beijing Univ Technol Coll Comp Sci Beijing 100124 Peoples R China Univ Greenwich Fac Engn & Sci Sch Comp & Math Sci London SE10 9LS England Edith Cowan Univ Sch Engn Joondalup WA 6027 Australia King Khalid Univ Dept Comp Sci Abha 62529 Saudi Arabia Univ Southampton Sch Elect & Comp Sci Southampton SO17 1BJ England
The Internet of Things (IoT) is a heterogeneous network composed of numerous dynamically connected devices. While it brings convenience, the IoT also faces serious challenges in data security. ciphertext-policy attrib... 详细信息
来源: 评论