咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy attribute-based encryption"
99 条 记 录,以下是21-30 订阅
排序:
Insecurity of Cheng et al.'s efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage  15
Insecurity of Cheng et al.'s efficient revocation in ciphert...
收藏 引用
15th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA) / 16th IEEE International Conference on Ubiquitous Computing and Communications (IUCC)
作者: Wang, Changji Wu, Jiayuan Yuan, Yuan Liu, Jing Guangdong Univ Foreign Studies Collaborat Innovat Ctr 21st Century Maritime Silk Sch Informat Sci & Technol Guangzhou 510006 Guangdong Peoples R China Sun Yat Sen Univ Sch Data Sci & Comp Guangzhou 510006 Guangdong Peoples R China Guangdong Univ Foreign Studies Sch Finance Guangzhou 510006 Guangdong Peoples R China Yunnan Univ Natl Pilot Sch Software Kunming 650500 Yunnan Peoples R China
ciphertext-policy attribute-based encryption (CP-ABE) is a promising solution to the problem of fine-grained access control over encrypted data in the cloud. Several CP-ABE based cryptographic cloud storage systems ha... 详细信息
来源: 评论
BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2021年 第3期17卷
作者: Zuo, Yuting Kang, Zhaozhe Xu, Jian Chen, Zhide Fujian Normal Univ Cangshan Campus8 Shangsan Rd Fuzhou 350007 Fujian Peoples R China
It is the most important and challenging problem to share the data safely in cloud computing. Some so-called trusted third parties may also infringe users' data privacy. It is an urgent problem for data owners to ... 详细信息
来源: 评论
White-Box Traceable ciphertext-policy attribute-based encryption in Multi-Domain Environment
收藏 引用
IEEE ACCESS 2019年 7卷 128298-128312页
作者: Yan, Xixi He, Xu Yu, Jinxia Tang, Yongli Henan Polytech Univ Sch Comp Sci & Technol Jiaozuo 454003 Henan Peoples R China
In a ciphertext-policy attribute-based encryption (CP-ABE) system, the decryption keys are only related to attributes shared by multiple users and do not contain any identity information of their original holders. Hen... 详细信息
来源: 评论
An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2020年 第2期16卷 1-15页
作者: Li, Hao Deng, Lianbing Yang, Cheng Liu, Jianbo Da Hengqin Sci & Technol Dev Co Ltd Zhuhai Peoples R China Commun Univ China Beijing Peoples R China Commun Univ China Sch Informat & Commun Engn 1 DingFuZhuang East St Beijing 100024 Peoples R China
With the development of cloud computing, more and more video services are moving to the cloud. How to realize fine-grained access control of those data on cloud becomes an urgent problem. attribute-based encryption pr... 详细信息
来源: 评论
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2019年 第4期15卷
作者: Yu, Gang Wang, Yongjuan Cao, Zhenfu Lin, Jian Wang, Xiangyu Informat Sci & Technol Inst State Key Lab Math Engn & Adv Comp Zhengzhou 450001 Henan Peoples R China Informat Sci & Technol Inst Henan Key Lab Network Cryptog Technol Zhengzhou 450001 Henan Peoples R China East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai 200062 Peoples R China
ciphertext-policy attribute-based encryption is a promising mechanism with fine-grained access control for cloud storage system. However, there is a long-lasting problem of key abuse that a user may share its decrypti... 详细信息
来源: 评论
Survey on Revocation in ciphertext-policy attribute-based encryption
收藏 引用
SENSORS 2019年 第7期19卷 1695.-1695.页
作者: Al-Dahhan, Ruqayah R. Shi, Qi Lee, Gyu Myoung Kifayat, Kashif Univ Anbar Coll Comp & Informat Technol Al Anbar 31001 Iraq Liverpool John Moores Univ Dept Comp Sci Byrom St Liverpool L3 3AF Merseyside England Air Univ Dept Comp Sci & Engn Islamabad 44000 Pakistan
Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers. In particular, ciphertext-policy... 详细信息
来源: 评论
Optimized ciphertext-policy attribute-based encryption with Efficient Revocation
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2013年 第6期7卷 385-394页
作者: Li, Yang Zhu, Jianming Wang, Xiuli Chai, Yanmei Shao, Shuai Cent Univ Finance & Econ Coll Informat Beijing 100081 Peoples R China China Informat Technol Secur Evaluat Ctr Beijing 100085 Peoples R China
In this work, we design a method for efficient revocation within ciphertext-policy attribute-based encryption scheme. Our main technical innovation is based on linear secret sharing and binary tree techniques, every u... 详细信息
来源: 评论
Fine-Grained Access Control for Cloud Data Sharing by Secure and Efficient attribute-Revocable ciphertext-policy attribute-based encryption
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2016年 第10期10卷 303-319页
作者: Vaanchig, Nyamsuren Chen, Wei Qin, Zhiguang Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Peoples R China
Nowadays, more and more users outsource their data to third party cloud storage servers for the purpose of sharing, so cloud data sharing becomes one of the popular services offered by cloud service providers. However... 详细信息
来源: 评论
Circuit ciphertext-policy attribute-based Hybrid encryption with Verifiable Delegation in Cloud Computing
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2016年 第1期27卷 119-129页
作者: Xu, Jie Wen, Qiaoyan Li, Wenmin Jin, Zhengping Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
In the cloud, for achieving access control and keeping data confidential, the data owners could adopt attribute-based encryption to encrypt the stored data. Users with limited computing power are however more likely t... 详细信息
来源: 评论
Multi-Value-Independent ciphertext-policy attribute based encryption with Fast Keyword Search
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2020年 第6期13卷 1142-1151页
作者: Wang, Haijiang Dong, Xiaolei Cao, Zhenfu Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai 200062 Peoples R China
ABKS has drawn much attention from research and industry in recent years, an ABKS scheme is an encryption scheme that supports keyword search and access control. attribute-based encryption is a public key encryption t... 详细信息
来源: 评论