咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy attribute-based encryption"
99 条 记 录,以下是11-20 订阅
排序:
TinyABE: Unrestricted ciphertext-policy attribute-based encryption for Embedded Devices and Low-Quality Networks  13th
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encr...
收藏 引用
13th International Conference on the Theory and Application of Cryptographic Techniques in Africa (AFRICACRYPT)
作者: Venema, Marloes Alpar, Greg Radboud Univ Nijmegen Nijmegen Netherlands Open Univ Netherlands Heerlen Netherlands
ciphertext-policy attribute-based encryption (CP-ABE) has attracted much interest from the practical community to enforce access control in distributed settings such as the Internet of Things (IoT). In such settings, ... 详细信息
来源: 评论
Identity-based Access Control for Digital Content based on ciphertext-policy attribute-based encryption
Identity-based Access Control for Digital Content based on C...
收藏 引用
International Conference on Information Networking (ICOIN)
作者: Huang, Win-Bin Su, Wei-Tsung Peking Univ Dept Informat Management Beijing Peoples R China Aletheia Univ Dept Comp Sci & Informat Engn New Taipei Taiwan
Digital content is easily spread out in the era of cloud computing. However, the challenge is providing an identity-based access control mechanism to carry out the rating system for preventing specific digital content... 详细信息
来源: 评论
Integrating ciphertext-policy attribute-based encryption with Identity-based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks  10
Integrating Ciphertext-Policy Attribute-Based Encryption wit...
收藏 引用
10th China International Conference on Information Security and Cryptology (Inscrypt)
作者: Wang, Changji Xu, Xilei Li, Yuan Shi, Dongyuan Yunnan Univ Natl Pilot Sch Software Kunming 650500 Peoples R China Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou 510275 Guangdong Peoples R China Sun Yat Sen Univ Guangdong Key Lab Informat Secur Technol Guangzhou 510275 Guangdong Peoples R China
The technology of wireless body area network (WBAN) has attracted intensive attention in recent years. For widespread deployment of WBANs, security and privacy issues must be addressed properly. Recently, Hu et al. pr... 详细信息
来源: 评论
A Threshold-based Key Generation Approach for ciphertext-policy attribute-based encryption  7
A Threshold-based Key Generation Approach for Ciphertext-Pol...
收藏 引用
International Conference on Ubiquitous and Future Networks
作者: Huang, Win-Bin Su, Wei-Tsung Liang, Chiang-Sheng Peking Univ Dept Informat Management Beijing Peoples R China Aletheia Univ Dept Comp Sci & Informat Engn New Taipei Taiwan
ciphertext-policy attribute-based encryption (CP-ABE) is proposed to provide identity-based access control which is suitable for cloud storage services. In CP-ABE, because the authority is responsible for key manageme... 详细信息
来源: 评论
A Survey on ciphertext-policy attribute-based encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to loT  17
A Survey on Ciphertext-Policy Attribute-based Encryption (CP...
收藏 引用
International Conference on Future Networks and Distributed Systems (ICFNDS)
作者: Moffat, Steve Hammoudeh, Mohammad Hegarty, Robert Manchester Metropolitan Univ Manchester Lancs England
The growth in Cloud Computing and the ubiquity of Mobile devices to access Cloud services has generated a new paradigm, Mobile Cloud Computing (MCC). While the benefits of storing and accessing data in the Cloud are w... 详细信息
来源: 评论
Anonymous Leakage-Resilient ciphertext-policy attribute-based encryption Supporting Direct Revocation  2nd
Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Base...
收藏 引用
2nd International Conference on Frontiers in Cyber Security (FCS)
作者: Gao, Xiaoxu Zhang, Leyou Hu, Gongcheng Xidian Univ Sch Math & Stat Xian 710126 Peoples R China
Leakage-resilient ciphertext-policy attribute-based encryption (LR-CP-ABE) is an important tool to achieve fine-grained access control of data and resist side-channel attacks. Privacy protection and user revocation ar... 详细信息
来源: 评论
Searchable ciphertext-policy attribute-based encryption with Multi-Keywords for Secure Cloud Storage  18
Searchable Ciphertext-Policy Attribute-Based Encryption with...
收藏 引用
International Conference on Computing and Pattern Recognition (ICCPR)
作者: Zhao, Zhiyuan Sun, Lei Li, Zuohui Liu, Ying Zhengzhou Informat Sci & Technol Inst 62 Sci AveHigh Tech Zone Zhengzhou Henan Peoples R China
Searchable encryption is one of the most important techniques for the sensitive data outsourced to cloud server, and has been widely used in cloud storage which brings huge convenience and saves bandwidth and computin... 详细信息
来源: 评论
A ciphertext-policy attribute-based encryption based on Multi-valued Decision Diagram  10th
A Ciphertext-Policy Attribute-Based Encryption Based on Mult...
收藏 引用
10th IFIP TC 12 International Conference on Intelligent Information Processing (IIP)
作者: Zhang, Shaowei Li, Long Chang, Liang Gu, Tianlong Liu, Huadong Guilin Univ Elect Technol Guangxi Key Lab Trusted Software Guilin 541004 Peoples R China
ciphertext-policy attribute-based encryption (CP-ABE) is a kind of asymmetric encryption which is widely used in cyber-physical system and Internet of Things. In CP-ABE, access structure is an important component affe... 详细信息
来源: 评论
A ciphertext-policy attribute-based encryption Scheme With Optimized ciphertext Size And Fast Decryption  17
A Ciphertext-Policy Attribute-based Encryption Scheme With O...
收藏 引用
ACM Asia Conference on Computer and Communications Security (ASIA CCS)
作者: Malluhi, Qutaibah M. Shikfa, Abdullatif Viet Cuong Trinh Qatar Univ Doha Qatar Hong Duc Univ Thanh Hoa Vietnam
We address the problem of ciphertext-policy attribute-based encryption with fine access control, a cryptographic primitive which has many concrete application scenarios such as Pay-TV, e-Health, Cloud Storage and so o... 详细信息
来源: 评论
An Efficient and Expressive ciphertext-policy attribute-based encryption Scheme with Partially Hidden Access Structures  10th
An Efficient and Expressive Ciphertext-Policy Attribute-Base...
收藏 引用
10th International Conference on Provable Security (ProvSec)
作者: Cui, Hui Deng, Robert H. Wu, Guowei Lai, Junzuo Singapore Management Univ Sch Informat Syst Singapore Singapore Jinan Univ Dept Comp Sci Guangzhou Guangdong Peoples R China
A promising solution to protect data privacy in cloud storage services is known as ciphertext-policy attribute-based encryption (CP-ABE). However, in a traditional CP-ABE scheme, a ciphertext is bound with an explicit... 详细信息
来源: 评论