咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy attribute-based encryption"
99 条 记 录,以下是51-60 订阅
Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model
收藏 引用
COMPUTER JOURNAL 2021年 第4期64卷 509-533页
作者: Li, Cong Shen, Qingni Xie, Zhikang Feng, Xinyu Fang, Yuejian Wu, Zhonghai Peking Univ Sch Software & Microelect Beijing 102600 Peoples R China Peking Univ Natl Engn Res Ctr Software Engn Beijing 100871 Peoples R China
attribute-based encryption with equality test (ABEET) simultaneously supports fine-grained access control on the encrypted data and plaintext message equality comparison without decrypting the ciphertexts. Recently, t... 详细信息
来源: 评论
An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage
收藏 引用
JOURNAL OF SYSTEMS ARCHITECTURE 2023年 第1期136卷
作者: He, Xu Li, Lixiang Peng, Haipeng Beijing Univ Posts & Telecommun Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Natl Engn Lab Disaster Backup & Recovery Beijing 100876 Peoples R China
Cloud storage can save not only local storage costs but also provide data-sharing services. ciphertext-policy attribute-based encryption (CP-ABE) can work as the underlying engine for cloud storage since it supports o... 详细信息
来源: 评论
Poly-ABE: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems
收藏 引用
JOURNAL OF SYSTEMS ARCHITECTURE 2023年 143卷
作者: Xue, Jingting Shi, Lingjie Zhang, Wenzheng Li, Wenyi Zhang, Xiaojun Zhou, Yu Southwest Petr Univ Sch Comp Sci Res Ctr Cyber Secur Chengdu 610500 Peoples R China 30th Res Inst China Elect Sci & Technol Grp Corp Key Lab Confidential Commun Chengdu 610041 Peoples R China
Demand response is a crucial measure in multi-energy systems (MESs) that encourages energy service providers (ESPs) to engage with energy users (EUs). In the energy internet, EUs can match their energy source requirem... 详细信息
来源: 评论
A fully distributed hierarchical attribute-based encryption scheme
收藏 引用
THEORETICAL COMPUTER SCIENCE 2020年 815卷 25-46页
作者: Ali, Mohammad Mohajeri, Javad Sadeghi, Mohammad-Reza Liu, Ximeng Amirkabir Univ Technol Dept Math & Comp Sci Tehran Iran Sharif Univ Technol Elect Res Inst Tehran Iran Fuzhou Univ Coll Math & Comp Sci Fuzhou 350108 Peoples R China Singapore Management Univ Sch Informat Syst Singapore 178902 Singapore
With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and ... 详细信息
来源: 评论
attribute-based Keyword Search over Hierarchical Data in Cloud Computing
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2020年 第6期13卷 985-998页
作者: Miao, Yinbin Ma, Jianfeng Liu, Ximeng Li, Xinghua Jiang, Qi Zhang, Junwei Xidian Univ Dept Cyber Engn Xian 710071 Peoples R China Singapore Management Univ Dept Informat Syst 80 Stamford Rd Singapore 188065 Singapore
Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal with the shared records that have hiera... 详细信息
来源: 评论
attribute-based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing  7
Attribute-Based Weighted Keyword Search Scheme Supporting Mu...
收藏 引用
7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud) / 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
作者: Wang, Shulan Li, Yuan Wang, Haiyan Zhang, Xi Chen, Jianyong Shenzhen Univ Coll Comp Sci & Software Engn Shenzhen Peoples R China Shenzhen Technol Univ Coll Big Data & Internet Shenzhen Peoples R China Peng Cheng Lab Cyberspace Secur Res Ctr Shenzhen Peoples R China
With the popularity of intelligent terminal, fog computing as a new generation of internet technology can integrate the computing power of terminals and improve the effective utilization of social resources. At the sa... 详细信息
来源: 评论
TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE  12th
TATIS: Trustworthy APIs for Threat Intelligence Sharing with...
收藏 引用
12th International Symposium on Foundations and Practice of Security (FPS)
作者: Preuveneers, Davy Joosen, Wouter Katholieke Univ Leuven Imec DistriNet Celestijnenlaan 200A B-3001 Heverlee Belgium
Threat intelligence platforms offer cyber emergency teams and security stakeholders access to sightings of cyberthreats and indicators of compromise. Given the sensitivity of the information, access may be restricted ... 详细信息
来源: 评论
CP-ABE Scheme Satisfying Constant-size Keys based on ECC  17
CP-ABE Scheme Satisfying Constant-size Keys based on ECC
收藏 引用
17th International Joint Conference on E-Business and Telecommunications (SECRYPT)
作者: Raj, Nishant Pais, Alwyn Roshan Natl Inst Technol Karnataka Dept Comp Sci & Engn Surathkal Karnataka India
Cloud-based applications, especially on IoT devices, is one of the desired fields to apply ciphertext-policy attribute-based encryption (CP-ABE). Most of the IoT devices are with the low-end configuration;hence, they ... 详细信息
来源: 评论
ACS-HCA:An Access Control Scheme Under Hierarchical Cryptography Architecture
收藏 引用
Chinese Journal of Electronics 2019年 第1期28卷 52-61页
作者: SHI Jiaoli HUANG Chuanhe HE Kai SHEN Xieyang State Key Lab of Software Engineering Computer SchoolWuhan University Collaborative Innovation Center of Geospatial Technology Jiujiang University Wuhan Textile University
Binding access policies to data,ciphertext-policy attribute-based encryption(CP-ABE)enables data access control to be independent from a certain application and lets users face data directly. It is regarded as one of ... 详细信息
来源: 评论
AC-AC: Dynamic revocable access control for acute care teams to access medical records
收藏 引用
Smart Health 2021年 20卷
作者: T. de Oliveira, Marcela Dang, Hai-Van A. Reis, Lúcio H. Marquering, Henk A. D. Olabarriaga, Sílvia Amsterdam University Medical Centers – University of Amsterdam Amsterdam Netherlands University of Westminster London United Kingdom
Acute care demands the collaboration of multiple healthcare professionals and various organisations. During an emergency, the availability of Electronic Medical Records (EMR) allows acute care teams to access a patien... 详细信息
来源: 评论