咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy attribute-based encryption"
99 条 记 录,以下是61-70 订阅
排序:
Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2023年 第2期20卷 1745-1758页
作者: Liu, Suhui Yu, Jiguo Chen, Liquan Chai, Baobao Southeast Univ Sch Cyber Sci & Engn Nanjing 211102 Peoples R China Qilu Univ Technol Big Data Inst Jinan 250353 Peoples R China Qilu Univ Technol Shandong Fundamental Res Ctr Comp Sci Jinan 250353 Shandong Peoples R China Shandong Univ Sci & Technol Sch Comp Sci & Engn Qingdao 266590 Peoples R China
Public clouds have drawn increasing attention from academia and industry due to their high computational and storage performance. attribute-based encryption (ABE) is the most promising technology to simultaneously ach... 详细信息
来源: 评论
Expressive CP-ABE Scheme for Mobile Devices in loT Satisfying Constant-Size Keys and ciphertexts
收藏 引用
IEEE ACCESS 2017年 5卷 3273-3283页
作者: Odelu, Vanga Das, Ashok Kumar Khan, Muhammad Khurram Choo, Kim-Kwang Raymond Jo, Minho Indian Inst Informat Technol Dept Comp Convergence Software Sricity 517588 India Int Inst Informat Technol Ctr Secur Theory & Algorithm Res Hyderabad 500032 Andhra Pradesh India King Saud Univ Ctr Excellence Informat Assurance Riyadh 12372 Saudi Arabia Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA Korea Univ Dept Comp Convergence Software Sejong Metropolitan City 30019 South Korea
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent focus. ciphertext-policy attrib... 详细信息
来源: 评论
Efficient attribute-based encryption Schemes for Secure Communications in Cyber Defense
收藏 引用
INTELLIGENT AUTOMATION AND SOFT COMPUTING 2016年 第3期22卷 397-403页
作者: Mao, Yijun Zhang, Yue Chen, Min-Rong Li, Yongbiao Zhan, Yiju Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou 510275 Guangdong Peoples R China South China Agr Univ Coll Math & Informat Guangzhou 510640 Guangdong Peoples R China Xian Univ Posts & Telecommun Natl Engn Lab Wireless Secur Xian 710121 Peoples R China South China Normal Univ Sch Comp Sci Guangzhou 510631 Guangdong Peoples R China Shenzhen Univ Coll Informat Engn Shenzhen 518060 Peoples R China Jinan Univ Dept Comp Sci Guangzhou 510632 Guangdong Peoples R China Sun Yat Sen Univ Sch Engn Guangzhou 510275 Guangdong Peoples R China
How to securely transmit data over the cyber is an important problem in cyber defense. In this paper, we propose a ciphertext-policy attribute-based encryption (CP-ABE) scheme, in which the messages are encrypted toge... 详细信息
来源: 评论
Partial policy hidden medical data access control method based on CP-ABE
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 1-12页
作者: Huang, Jing Tang, Detao Jiang, Chenyu Chen, Fulong Zhang, Ji Xie, Dong Wang, Taochun Zhao, Chuanxin Wang, Chao Li, Jintao Anhui Normal University Anhui Wuhu241000 China Anhui Vocational Colledge of Defense Technology Anhui Liuan237000 China University of Southern Queensland ToowoombaQLD4350 Australia
The secure sharing and privacy protection of medical data are of great significance during the development of smart medical care. In order to achieve data sharing among medical institutions, ciphertext-policy attribut... 详细信息
来源: 评论
Security Protection of System Sharing Data with Improved CP-ABE encryption Algorithm under Cloud Computing Environment
收藏 引用
AUTOMATIC CONTROL AND COMPUTER SCIENCES 2019年 第4期53卷 342-350页
作者: Xue, Shumin Ren, Chengjuan Baoji Univ Arts & Sci Sch Comp Baoji 721016 Shaanxi Peoples R China
As the scale of cloud computing expands gradually, the security of data sharing in cloud computing environment is facing more and more challenges. In this study, an improved, efficient data encryption method was propo... 详细信息
来源: 评论
Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption  11th
Requester-Centric CP-ABE Combining Removing Escrow and Outso...
收藏 引用
11th International Symposium on Cyberspace Safety and Security (CSS)
作者: Yao, Wang Wu, Faguo Zhang, Xiao Beihang Univ Key Lab Math Informat & Behav Semant Minist Educ Beijing 100191 Peoples R China Beihang Univ Sch Math & Syst Sci Beijing 100191 Peoples R China Peng Cheng Lab Shenzhen 518055 Guangdong Peoples R China Beihang Univ Beijing Adv Innovat Ctr Big Data & Brain Comp Beijing 100191 Peoples R China
Key escrow and low efficiency are two practical bottlenecks of attribute-based encryption. In this paper, a Requester-Centric CP-ABE (RC-CP-ABE) combining removing escrow and outsourcing decryption is proposed. By the... 详细信息
来源: 评论
AnonyCast: Privacy-Preserving Location Distribution for Anonymous Crowd Tracking Systems  15
AnonyCast: Privacy-Preserving Location Distribution for Anon...
收藏 引用
ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp)
作者: Higuchi, Takamasa Martin, Paul Chakraborty, Supriyo Srivastava, Mani Osaka Univ Suita Osaka 565 Japan Univ Calif Los Angeles Los Angeles CA USA IBM Res Corp Yorktown Hts NY USA
Fusion of infrastructure-based pedestrian tracking systems and embedded sensors on mobile devices holds promise for providing accurate positioning in large public buildings. However, privacy concerns regarding handlin... 详细信息
来源: 评论
An Efficient Framework for Verifiable Access Control based Dynamic Data Updates in Public Cloud  13th
An Efficient Framework for Verifiable Access Control Based D...
收藏 引用
13th International Conference on Distributed Computing and Internet Technology (ICDCIT)
作者: Sabitha, S. Rajasree, M. S. Engn Coll Trivandrum Kerala India IIITM K Trivandrum Kerala India
attribute-based encryption enables the users to get the data only if attributes of the users are satisfied with the access policy embedded in the ciphertext. Whenever it is used in a collaborative environment, user... 详细信息
来源: 评论
Multi-keyword Ranked Searchable encryption Supporting CP-ABE Test
Multi-keyword Ranked Searchable Encryption Supporting CP-ABE...
收藏 引用
IEEE International Conference on Computing, Communications and IoT Applications (IEEE ComComAp)
作者: Wu, Chuxin Zhang, Peng Liu, Hongwei Liu, Yuhong Shenzhen Univ Coll Elect & Informat Engn ATR Key Lab Natl Def Technol Shenzhen Peoples R China Shenzhen Technol Univ Shenzhen Peoples R China Santa Clara Univ Dept Comp Engn Santa Clara CA 95053 USA
Internet of Things (IoT) and cloud computing are promising technologies that change the way people communicate and live. As the data collected through IoT devices often involve users' private information and the c... 详细信息
来源: 评论
Anonymous-CPABE: Privacy Preserved Content Disclosure for Data Sharing in Cloud  28
Anonymous-CPABE: Privacy Preserved Content Disclosure for Da...
收藏 引用
28th International Conference on Architecture of Computing Systems (ARCS)
作者: Sabitha, S. Rajasree, M. S. Coll Engn Dept Comp Sci & Engn Trivandrum Kerala India IIITM K Trivandrum Kerala India
Healthcare Providers are widely using Cloud Computing to securely share Electronic Health Record(EHR). Entire EHR data cannot be disclosed to all the users with different privilege level, since it is more privacy sens... 详细信息
来源: 评论