咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy attribute-based encryption"
99 条 记 录,以下是31-40 订阅
排序:
Comment on "Circuit ciphertext-policy attribute-based Hybrid encryption With Verifiable Delegation in Cloud Computing"
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2021年 第2期32卷 392-393页
作者: Cao, Zhengjun Markowitch, Olivier Shanghai Univ Dept Math Shangda Rd 99 Shanghai 200444 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Xitucheng Rd 10 Beijing Peoples R China Univ Libre Bruxelles Comp Sci Dept Blvd Triomphe CP 2121050 Brussels Belgium
The scheme [1] is flawed because: (1) its circuit access structure is confusingly described;(2) the cloud server cannot complete the related computations;(3) some users can conspire to generate new decryption keys, wi... 详细信息
来源: 评论
Large Universe ciphertext-policy attribute-based encryption with Efficient Revocation
Large Universe Ciphertext-Policy Attribute-Based Encryption ...
收藏 引用
2017 2nd International Conference on Electrical, Automation and Mechanical Engineering(EAME2017)
作者: Lei Sun Shuaili Wang Zuohui Li Guangbo Wang Zhengzhou Information Science and Technology Institute
In this paper, we propose a large universe ciphertextpolicy attribute based encryption(ABE) scheme with efficient revocation. To achieve the revocation, we divide the master key into two parts: delegation key and secr... 详细信息
来源: 评论
ciphertext-policy attribute-based delay encryption
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 2023年 第2期22卷 167-185页
作者: Chen, Lijiao Lv, Kewei Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing 100093 Peoples R China
Timed-release CP-ABE can provide fine-grained and timed-release access control while ensuring data confidentiality. Existing schemes usually rely on a trusted third-party called time server. This paper proposes a nove... 详细信息
来源: 评论
A secure and efficient ciphertext-policy attribute-based Proxy Re-encryption for cloud data sharing
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2015年 52卷 95-108页
作者: Liang, Kaitai Au, Man Ho Liu, Joseph K. Susilo, Willy Wong, Duncan S. Yang, Guomin Yu, Yong Yang, Anjia City Univ Hong Kong Dept Comp Sci Hong Kong Hong Kong Peoples R China Hong Kong Polytech Univ Dept Comp Hong Kong Hong Kong Peoples R China ASTAR Inst Infocomm Res Singapore Singapore Univ Wollongong Sch Comp Sci & Software Engn Ctr Comp & Informat Secur Res Wollongong NSW 2522 Australia
Proxy Re-encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate the access rights of the encrypted data stored on a cloud storage system to others without leaking the information of ... 详细信息
来源: 评论
Two-layer ciphertext-policy attribute-based Proxy Re-encryption for Supporting PHR Delegation  19
Two-layer Ciphertext-Policy Attribute-Based Proxy Re-encrypt...
收藏 引用
International Computer Science and Engineering Conference (ICSEC)
作者: Wungpornpaiboon, G. Vasupongayya, S. Prince Songkla Univ Fac Engn Dept Comp Engn Hat Yai 90112 Songkhla Thailand
Medical treatment sometimes requires a case forwarding to a doctor who has a specific expertise. Typically, an electronic medical record (EMS) of a patient can be passed to another doctor without asking the patient be... 详细信息
来源: 评论
Flexible and Efficient Multi-Authorization Data Sharing Scheme With Enhanced Privacy Protection
收藏 引用
INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES 2025年 第1期21卷
作者: Zhong, Chen Yue, Qiuling Hainan Univ Sch Cyberspace Secur Sch Cryptol Haikou Peoples R China
The advancement of the digital economy relies on secure data sharing. However, most existing methods face challenges like single-points-of-failure, insufficient privacy protection, and low efficiency. To address these... 详细信息
来源: 评论
A lattice-based CP-ABE scheme with immediate attribute revocation
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 2025年 第1-2期26卷 41-67页
作者: He, Miao Helil, Nurmamat Xinjiang Univ Coll Math & Syst Sci Xinjiang Peoples R China
ciphertext-policy attribute-based encryption (CP-ABE) is suitable for providing secure data-sharing services in the cloud storage scenario. However, attribute revocation in CP-ABE is a sticky issue. The research achie... 详细信息
来源: 评论
ciphertext-policy attribute-based Access Control with Effective User Revocation for Cloud Data Sharing System  4
Ciphertext-Policy Attribute-Based Access Control with Effect...
收藏 引用
4th International Conference on Advanced Cloud and Big Data (CBD)
作者: Vaanchig, Nyamsuren Chen, Wei Qin, Zhiguang Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu Peoples R China
With the development and benefits of cloud computing, nowadays more and more users outsource their data to third party cloud storage servers for ease of sharing and cost saving. ciphertext-policy attribute-based Encry... 详细信息
来源: 评论
ACS-HCA:An Access Control Scheme Under Hierarchical Cryptography Architecture
收藏 引用
Chinese Journal of Electronics 2019年 第1期28卷 52-61页
作者: SHI Jiaoli HUANG Chuanhe HE Kai SHEN Xieyang State Key Lab of Software Engineering Computer SchoolWuhan University Collaborative Innovation Center of Geospatial Technology Jiujiang University Wuhan Textile University
Binding access policies to data,ciphertext-policy attribute-based encryption(CP-ABE)enables data access control to be independent from a certain application and lets users face data directly. It is regarded as one of ... 详细信息
来源: 评论
A fully distributed hierarchical attribute-based encryption scheme
收藏 引用
THEORETICAL COMPUTER SCIENCE 2020年 815卷 25-46页
作者: Ali, Mohammad Mohajeri, Javad Sadeghi, Mohammad-Reza Liu, Ximeng Amirkabir Univ Technol Dept Math & Comp Sci Tehran Iran Sharif Univ Technol Elect Res Inst Tehran Iran Fuzhou Univ Coll Math & Comp Sci Fuzhou 350108 Peoples R China Singapore Management Univ Sch Informat Syst Singapore 178902 Singapore
With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and ... 详细信息
来源: 评论