咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy attribute-based encryption"
99 条 记 录,以下是91-100 订阅
attribute Revocable attribute-based encryption for Decentralized Disruption-Tolerant Military Networks  3
Attribute Revocable Attribute-Based Encryption for Decentral...
收藏 引用
3rd International Symposium on Computing and Networking (CANDAR)
作者: Nomura, Kenta Mohri, Masami Ii, Yoshiaki Si Iiraisi Morii, Masakatu Kobe Univ Kobe Hyogo 6578501 Japan Gifu Univ Gifu 5011193 Japan
Disruption-tolerant network technologies are becoming solutions to access the confidential information or command by exploiting external storage node. It is necessary to encrypt the shared data to prevent illegal acce... 详细信息
来源: 评论
Anonymous-CPABE: Privacy Preserved Content Disclosure for Data Sharing in Cloud  28
Anonymous-CPABE: Privacy Preserved Content Disclosure for Da...
收藏 引用
28th International Conference on Architecture of Computing Systems (ARCS)
作者: Sabitha, S. Rajasree, M. S. Coll Engn Dept Comp Sci & Engn Trivandrum Kerala India IIITM K Trivandrum Kerala India
Healthcare Providers are widely using Cloud Computing to securely share Electronic Health Record(EHR). Entire EHR data cannot be disclosed to all the users with different privilege level, since it is more privacy sens... 详细信息
来源: 评论
Insecurity of an Dynamic User Revocation and Key Refreshing for attribute-based encryption Scheme  10
Insecurity of an Dynamic User Revocation and Key Refreshing ...
收藏 引用
10th International Conference on Computational Intelligence and Security CIS 2014
作者: Wang, Changji Lin, Haitao Xu, Xilei Zheng, Kangjia Xia, Xiaonan Yunnan Univ Natl Pilot Sch Software Kunming Peoples R China Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou Guangdong Peoples R China
Cloud computing has generated a major impact on the global IT ecosystem, which promises economic advantages, speed, agility, flexibility, virtually infinite elasticity and innovation. However, data security and privac... 详细信息
来源: 评论
An Efficient Cloud-based Personal Health Records System Using attribute-based encryption and Anonymous Multi-Receiver Identity-based encryption  9
An Efficient Cloud-based Personal Health Records System Usin...
收藏 引用
NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC)
作者: Wang, Chang-Ji Xu, Xi-Lei Shi, Dong-Yuan Lin, Wen-Long Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou 510006 Guangdong Peoples R China Guangdong Prov Informat Secur Key Lab Guangzhou 510006 Guangdong Peoples R China
As an emerging patient-centric model of health information exchange, cloud-based personal health record (PHR) system holds great promise for empowering patients and ensuring more effective delivery of health care. In ... 详细信息
来源: 评论
Expressive CP-ABE with Partially Hidden Access Structures  12
Expressive CP-ABE with Partially Hidden Access Structures
收藏 引用
7th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
作者: Lai, Junzuo Deng, Robert H. Li, Yingjiu Singapore Management Univ Sch Informat Syst Singapore Singapore
In a traditional ciphertext-policy attribute-based encryption (CP-ABE) scheme, an access structure, also refereed to as ciphertext-policy, is sent along with a ciphertext explicitly, and anyone who obtains a ciphertex... 详细信息
来源: 评论
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NE...
收藏 引用
4th IEEE International Conference on Broadband Network and Multimedia Technology (IEEE IC-BNMT 2011)
作者: Chen, Chen Huang, Zheng Wen, Qiaoyan Fan, Yajun Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
The key management of wireless sensor networks is one of the most important research topics for the secure communications. In light of the unique characteristics in Wireless sensor network such as large scale of deplo... 详细信息
来源: 评论
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NE...
收藏 引用
2011 4th IEEE International Conference on Broadband Network & Multimedia Technology(第四届IEEE宽带网络与多媒体国际会议 4th IEEE IC-BNMT2011)
作者: Chen Chen Zheng Huang Qiaoyan Wen Yajun Fan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
The key management of wireless sensor networks is one of the most important research topics for the secure communications. In light of the unique characteristics in Wireless sensor network such as large scale of deplo... 详细信息
来源: 评论
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NE...
收藏 引用
2011 4th IEEE International Conference on Broadband Network and Multimedia Technology
作者: Chen Chen Zheng Huang Qiaoyan Wen Yajun Fan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
The key management of wireless sensor networks is one of the most important research topics for the secure *** light of the unique characteristics in Wireless sensor network such as large scale of deployment,mobility ... 详细信息
来源: 评论
Secure Blockchain Assisted attribute-based Keyword Search for Collaborative E-Healthcare
收藏 引用
Distributed Ledger Technologies: Research and Practice 1000年
作者: Kasturi Routray Abhiram Manikonda Padmalochan Bera Indian Institute of Technology Bhubaneswar India
In the age of technological advancement, collaborative E-healthcare emerges as a transformative system eliminating traditional location and accessibility barriers in healthcare services. Here, Searchable encryption (S... 详细信息
来源: 评论