咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 8 篇 计算机科学与技术...
    • 7 篇 信息与通信工程
    • 4 篇 电气工程
    • 1 篇 电子科学与技术(可...

主题

  • 9 篇 hierarchical att...
  • 4 篇 cloud computing
  • 2 篇 multi-authority
  • 2 篇 fine-grained acc...
  • 1 篇 standard model
  • 1 篇 internet of thin...
  • 1 篇 access contol
  • 1 篇 access control
  • 1 篇 medical data man...
  • 1 篇 mobile cloud ser...
  • 1 篇 data privacy
  • 1 篇 key-delegation a...
  • 1 篇 redundant inform...
  • 1 篇 large-universe
  • 1 篇 medical services
  • 1 篇 biomedical monit...
  • 1 篇 smart contract
  • 1 篇 side-channel att...
  • 1 篇 white box tracea...
  • 1 篇 blockchain

机构

  • 1 篇 amirkabir univ t...
  • 1 篇 ryerson univ dep...
  • 1 篇 beijing jiaotong...
  • 1 篇 hohai univ coll ...
  • 1 篇 shanghai jiao to...
  • 1 篇 guilin univ elec...
  • 1 篇 northwest normal...
  • 1 篇 natl dong hwa un...
  • 1 篇 natl inst techno...
  • 1 篇 guilin univ elec...
  • 1 篇 china telecom wa...
  • 1 篇 singapore manage...
  • 1 篇 cent s univ sch ...
  • 1 篇 huaibei normal u...
  • 1 篇 henan univ sci &...
  • 1 篇 fuzhou univ coll...
  • 1 篇 sharif univ tech...
  • 1 篇 xidian univ key ...
  • 1 篇 nanjing univ inf...
  • 1 篇 temple univ dept...

作者

  • 1 篇 li cheng
  • 1 篇 liu xueyan
  • 1 篇 zhang zhiyong
  • 1 篇 zhang leyou
  • 1 篇 liu qin
  • 1 篇 wang guojun
  • 1 篇 wu jie
  • 1 篇 guo yuyan
  • 1 篇 mohajeri javad
  • 1 篇 li yong
  • 1 篇 liu yun
  • 1 篇 ali mohammad
  • 1 篇 jing song
  • 1 篇 niu danmei
  • 1 篇 qian he
  • 1 篇 shen jian
  • 1 篇 chen xi
  • 1 篇 hu yupu
  • 1 篇 zhang yichen
  • 1 篇 liu tao

语言

  • 9 篇 英文
检索条件"主题词=Hierarchical attribute-based encryption"
9 条 记 录,以下是1-10 订阅
A fully distributed hierarchical attribute-based encryption scheme
收藏 引用
THEORETICAL COMPUTER SCIENCE 2020年 815卷 25-46页
作者: Ali, Mohammad Mohajeri, Javad Sadeghi, Mohammad-Reza Liu, Ximeng Amirkabir Univ Technol Dept Math & Comp Sci Tehran Iran Sharif Univ Technol Elect Res Inst Tehran Iran Fuzhou Univ Coll Math & Comp Sci Fuzhou 350108 Peoples R China Singapore Management Univ Sch Informat Syst Singapore 178902 Singapore
With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and ... 详细信息
来源: 评论
Ciphertext-Policy hierarchical attribute-based encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System
收藏 引用
IEEE ACCESS 2020年 8卷 86630-86650页
作者: Chen, Xi Liu, Yun Chao, Han-Chieh Li, Yong Beijing Jiaotong Univ Key Lab Commun & Informat Syst Beijing Municipal Commiss Educ Beijing 100044 Peoples R China Natl Dong Hwa Univ Dept Elect Engn Hualien 974 Taiwan
With the maturity of technologies such as Internet of Things (IoT) and Cloud Computing, more and more medical institutions share patient & x2019;s medical data in the IoT-connected healthcare system, whereas it al... 详细信息
来源: 评论
HABEm: hierarchical attribute based encryption with Multi-Authority for the Mobile Cloud Service
HABEm: Hierarchical Attribute Based Encryption with Multi-Au...
收藏 引用
IEEE/CIC International Conference on Communications in China (ICCC)
作者: Qian, He Jing, Song Hong, Xu Yong, Wang Guilin Univ Elect Technol Guangxi Key Lab Cryptograph & Informat Secur Guilin 541004 Peoples R China Guilin Univ Elect Technol Key Lab Cloud Comp & Complex Syst Guilin 541004 Peoples R China
For the mobile cloud service, the computation and power resources of the mobile terminal are limited. And the attribute-based encryption algorithm has the uncertainty of the attribute expiration time, which highly lik... 详细信息
来源: 评论
hierarchical attribute-based encryption with continuous auxiliary inputs leakage
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2016年 第18期9卷 4852-4862页
作者: Guo, Yuyan Li, Jiguo Zhang, Yichen Shen, Jian Hohai Univ Coll Comp & Informat Nanjing 211000 Jiangsu Peoples R China Huaibei Normal Univ Sch Comp Sci & Technol Huaibei 235000 Anhui Peoples R China Nanjing Univ Informat Sci & Technol Sch Comp & Software Nanjing 210044 Jiangsu Peoples R China
The continuous auxiliary inputs leakage is more strong side-channel attacks. In this article, we first propose a continuous auxiliary inputs leakage model for the hierarchical attribute-based encryption scheme. Under ... 详细信息
来源: 评论
New Constructions of hierarchical attribute-based encryption for Fine-Grained Access Control in Cloud Computing
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2013年 第5期7卷 1343-1356页
作者: Zhang, Leyou Hu, Yupu Xidian Univ Dept Math Xian 710071 Peoples R China Xidian Univ Key Lab Comp Networks & Informat Secur Xian 710071 Peoples R China
Cloud computing has emerged as perhaps the hottest development in information technology at present. This new computing technology requires that the users ensure that their infrastructure is safety and that their data... 详细信息
来源: 评论
Black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2023年 第9期17卷 2550-2572页
作者: Liu, Xueyan Sun, Ruirui Li, Linpeng Li, Wenjing Liu, Tao Northwest Normal Univ Coll Comp Sci & Engn Lanzhou Gansu Peoples R China China Telecom WanWei Informat Technol Co LTD Lanzhou Gansu Peoples R China
Epidemiological survey is an important means for the prevention and control of infectious diseases. Due to the particularity of the epidemic survey, 1) epidemiological survey in epidemic prevention and control has a w... 详细信息
来源: 评论
hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
收藏 引用
COMPUTERS & SECURITY 2011年 第5期30卷 320-331页
作者: Wang, Guojun Liu, Qin Wu, Jie Guo, Minyi Cent S Univ Sch Informat Sci & Engn Changsha 410083 Hunan Peoples R China Temple Univ Dept Comp & Informat Sci Philadelphia PA 19122 USA Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200030 Peoples R China
With rapid development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. To keep the shared data confidential against untrusted cloud service providers (CSPs), a... 详细信息
来源: 评论
Application of Blockchain to Patient-Centric Access Control in Medical Data Management Systems  10
Application of Blockchain to Patient-Centric Access Control ...
收藏 引用
IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
作者: Ghaffaripour, Shadan Miri, Ali Ryerson Univ Dept Comp Sci Toronto ON Canada
We proposed a novel solution to the privacy issues in medical data management systems with multi-user data-sharing requirement. Our solution leverages the blockchain technology, in combination with hierarchical Attrib... 详细信息
来源: 评论
Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for hierarchical attributes
收藏 引用
IEEE ACCESS 2018年 6卷 38273-38284页
作者: Zhang, Zhiyong Li, Cheng Gupta, Brij B. Niu, Danmei Henan Univ Sci & Technol Informat Engn Coll Luoyang 471023 Peoples R China Natl Inst Technol Kurukshetra Kurukshetra 136119 Haryana India
In an attribute-based encryption, the user is identified with help of some attributes and their functions for encryption and decryption of the data. The current techniques based on attribute-based encryption have foun... 详细信息
来源: 评论