咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Ciphertext-policy attribute-based encryption"
99 条 记 录,以下是81-90 订阅
排序:
fABElous: An attribute-based Scheme for Industrial Internet of Things  5
fABElous: An Attribute-Based Scheme for Industrial Internet ...
收藏 引用
5th IEEE International Conference on Smart Computing (SMARTCOMP)
作者: La Manna, Michele Perazzo, Pericle Rasori, Marco Dini, Gianluca Univ Florence Dept Informat Engn Florence Italy Univ Pisa Dept Informat Engn Pisa Italy
The Internet of Things (IoT) is a technological vision in which constrained or embedded devices connect together through the Internet. This enables common objects to be empowered with communication and cooperation cap... 详细信息
来源: 评论
Privacy-Friendly Photo Sharing and Relevant Applications Beyond
Privacy-Friendly Photo Sharing and Relevant Applications Bey...
收藏 引用
作者: Lin YUAN ECOLE POLYTECHNIQUE FEDERALE DE LAUSANNE
学位级别:博士
Online photo sharing has become everyday life for many, but has also raised concerns for privacy. Online social networking (OSN) sites usually offer a limited degree of privacy protection and the most common solution ... 详细信息
来源: 评论
An Efficient Cloud-based Personal Health Records System Using attribute-based encryption and Anonymous Multi-Receiver Identity-based encryption  9
An Efficient Cloud-based Personal Health Records System Usin...
收藏 引用
NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC)
作者: Wang, Chang-Ji Xu, Xi-Lei Shi, Dong-Yuan Lin, Wen-Long Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou 510006 Guangdong Peoples R China Guangdong Prov Informat Secur Key Lab Guangzhou 510006 Guangdong Peoples R China
As an emerging patient-centric model of health information exchange, cloud-based personal health record (PHR) system holds great promise for empowering patients and ensuring more effective delivery of health care. In ... 详细信息
来源: 评论
A Lightweight Access Control Scheme Supporting policy Hidden based on Path Bloom Filter  19th
A Lightweight Access Control Scheme Supporting Policy Hidden...
收藏 引用
19th International Conference on Information Security and Cryptology (Inscrypt)
作者: Luo, Chao Shi, Jiaoli Xie, Minchen Hu, Chao Wang, Lihua Mei, Zhuolin Yao, Shimao Li, Hui Jiujiang Univ Sch Comp & Big Data Sci Jiujiang 332005 Jiangxi Peoples R China Jiujiang Key Lab Network & Informat Secur Jiujiang 332005 Jiangxi Peoples R China Jiujiang Univ Inst Informat Secur Jiujiang 332005 Jiangxi Peoples R China Peking Univ Shenzhen Grad Sch Shenzhen Peoples R China
Traditional CP-ABE (ciphertext-policy attribute-based encryption) schemes require the access policy to be uploaded to the cloud along with the ciphertext, but access policies often also involve some private informatio... 详细信息
来源: 评论
Fine-grained encryption for Secure Research Data Sharing  35
Fine-grained Encryption for Secure Research Data Sharing
收藏 引用
35th IEEE International Symposium on Computer-based Medical Systems (CBMS)
作者: Reis, Lucio H. A. de Oliveira, Marcela T. Olabarriaga, Silvia D. Univ Amsterdam Epidemiol & Data Sci Amsterdam UMC Locat Amsterdam Netherlands Univ Amsterdam Biomed Engn & Phys Amsterdam UMC Locat Amsterdam Netherlands Amsterdam Publ Hlth & Methodol Amsterdam Netherlands
Research data sharing requires provision of adequate security. The requirements for data privacy are extremely demanding for medical data that is reused for research purposes. To address these requirements, the resear... 详细信息
来源: 评论
Redesign CloudRAID for Flexible and Secure Enterprise File Sharing over Public Cloud Storage  17
Redesign CloudRAID for Flexible and Secure Enterprise File S...
收藏 引用
10th International Conference on Security of Information and Networks (SIN)
作者: Sukmana, Muhammad I. H. Torkura, Kennedy A. Meinel, Christoph Graupner, Hendrik Univ Potsdam HPI Potsdam Germany Bundesdruckerei GmbH Berlin Germany
CloudRAID is a secure personal cloud storage broker that provides data availability, security, and privacy for private usage. But some of the challenges need to be resolved to use CloudRAID as an enterprise cloud stor... 详细信息
来源: 评论
CP-ABE Scheme Satisfying Constant-size Keys based on ECC  17
CP-ABE Scheme Satisfying Constant-size Keys based on ECC
收藏 引用
17th International Joint Conference on E-Business and Telecommunications (SECRYPT)
作者: Raj, Nishant Pais, Alwyn Roshan Natl Inst Technol Karnataka Dept Comp Sci & Engn Surathkal Karnataka India
Cloud-based applications, especially on IoT devices, is one of the desired fields to apply ciphertext-policy attribute-based encryption (CP-ABE). Most of the IoT devices are with the low-end configuration;hence, they ... 详细信息
来源: 评论
An enhanced traceable CP-ABE scheme against various types of privilege leakage in cloud storage
收藏 引用
JOURNAL OF SYSTEMS ARCHITECTURE 2023年 第1期136卷
作者: He, Xu Li, Lixiang Peng, Haipeng Beijing Univ Posts & Telecommun Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Natl Engn Lab Disaster Backup & Recovery Beijing 100876 Peoples R China
Cloud storage can save not only local storage costs but also provide data-sharing services. ciphertext-policy attribute-based encryption (CP-ABE) can work as the underlying engine for cloud storage since it supports o... 详细信息
来源: 评论
Secure and Efficient Conjunctive Keyword Search Scheme without Secure Channel
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2019年 第5期13卷 2718-2731页
作者: Wang, Jianhua Zhao, Zhiyuan Sun, Lei Zhu, Zhiqiang Zhengzhou Informat Sci & Technol Inst Zhengzhou 450001 Henan Peoples R China
Conjunctive keyword search encryption is an important technique for protecting sensitive data that is outsourced to cloud servers. However, the process of searching outsourced data may facilitate the leakage of sensit... 详细信息
来源: 评论
Poly-ABE: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems
收藏 引用
JOURNAL OF SYSTEMS ARCHITECTURE 2023年 143卷
作者: Xue, Jingting Shi, Lingjie Zhang, Wenzheng Li, Wenyi Zhang, Xiaojun Zhou, Yu Southwest Petr Univ Sch Comp Sci Res Ctr Cyber Secur Chengdu 610500 Peoples R China 30th Res Inst China Elect Sci & Technol Grp Corp Key Lab Confidential Commun Chengdu 610041 Peoples R China
Demand response is a crucial measure in multi-energy systems (MESs) that encourages energy service providers (ESPs) to engage with energy users (EUs). In the energy internet, EUs can match their energy source requirem... 详细信息
来源: 评论