咨询与建议

限定检索结果

文献类型

  • 134 篇 会议
  • 78 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 214 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 196 篇 工学
    • 173 篇 计算机科学与技术...
    • 75 篇 电气工程
    • 63 篇 信息与通信工程
    • 33 篇 软件工程
    • 8 篇 控制科学与工程
    • 6 篇 网络空间安全
    • 5 篇 电子科学与技术(可...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
  • 14 篇 理学
    • 8 篇 数学
    • 4 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 11 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 214 篇 attribute based ...
  • 39 篇 cloud computing
  • 30 篇 access control
  • 24 篇 security
  • 24 篇 privacy
  • 13 篇 encryption
  • 12 篇 searchable encry...
  • 10 篇 internet of thin...
  • 10 篇 blockchain
  • 8 篇 revocation
  • 8 篇 fine-grained acc...
  • 8 篇 proxy re-encrypt...
  • 8 篇 cloud storage
  • 7 篇 multi-authority
  • 7 篇 cp-abe
  • 7 篇 access policy
  • 7 篇 cloud security
  • 7 篇 cryptography
  • 7 篇 anonymity
  • 6 篇 data sharing

机构

  • 4 篇 indian inst tech...
  • 4 篇 univ elect sci &...
  • 3 篇 da iict gandhina...
  • 3 篇 fujian normal un...
  • 3 篇 natl inst techno...
  • 2 篇 chinese acad sci...
  • 2 篇 natl inst techno...
  • 2 篇 hangzhou dianzi ...
  • 2 篇 ldrp itr gandhin...
  • 2 篇 univ carthage ec...
  • 2 篇 vit univ sch inf...
  • 2 篇 idrbt hyderabad
  • 2 篇 ecole natl super...
  • 2 篇 univ chinese aca...
  • 2 篇 山东大学
  • 2 篇 iit madras chenn...
  • 2 篇 missouri univ sc...
  • 2 篇 southeast univ s...
  • 2 篇 nanjing univ pos...
  • 2 篇 fuzhou univ coll...

作者

  • 6 篇 dutta ratna
  • 4 篇 yang guomin
  • 4 篇 das manik lal
  • 4 篇 kaci abdellah
  • 4 篇 chaudhari payal
  • 4 篇 nouali omar
  • 4 篇 bouabdallah abde...
  • 4 篇 guleria vandana
  • 4 篇 susilo willy
  • 3 篇 laurent maryline
  • 3 篇 belguith sana
  • 3 篇 zhang rui
  • 3 篇 madria sanjay
  • 3 篇 bouabana-tebibel...
  • 3 篇 hadjidj abdelkri...
  • 3 篇 kaaniche nesrine
  • 3 篇 zhang yichen
  • 3 篇 amira abdelouaha...
  • 3 篇 lounis ahmed
  • 3 篇 hong hanshu

语言

  • 209 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"主题词=attribute based encryption"
214 条 记 录,以下是1-10 订阅
排序:
attribute based encryption with Privacy Protection and Accountability for CloudIoT
收藏 引用
IEEE TRANSACTIONS ON CLOUD COMPUTING 2022年 第2期10卷 762-773页
作者: Li, Jiguo Zhang, Yichen Ning, Jianting Huang, Xinyi Poh, Geong Sen Wang, Debang Fujian Normal Univ Coll Math & Informat Fuzhou 350117 Fujian Peoples R China Fujian Prov Key Lab Network Secur & Cryptol Fuzho Fuzhou 350117 Fujian Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Natl Univ Singapore Dept Comp Sci Singapore 119077 Singapore
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems a very challenging task. More so when access and storage are performed through a cloud-based IoT system. IoT data stored on clou... 详细信息
来源: 评论
A secure multi-authority attribute based encryption approach for robust smart grids
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2024年 第7期36卷 e7972-e7972页
作者: Saidi, Ahmed Amira, Abdelouahab Nouali, Omar Res Ctr Sci & Tech Informat CERIST DSI Ben Aknoun Algeria Res Ctr Sci & Tech Informat CERIST DSI Ben Aknoun 16000 Algiers Algeria
This paper presents EMBASS, an Enhanced Multi-Authority attribute-based encryption System for Smart Grids. EMBASS supports outsourced decryption to devices with limited resources. It also uses a proxy to add fake valu... 详细信息
来源: 评论
A Delegatable attribute based encryption Scheme for a Collaborative E-Health Cloud
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2023年 第2期16卷 787-801页
作者: Pussewalage, Harsha Sandaruwan Gardiyawasam Oleshchuk, Vladimir Univ Agder UiA Dept Informat & Commun Technol N-4898 Grimstad Norway
With the popularization and growing utilization of electronic health records (EHRs) coupled with the advancements in cloud computing, healthcare providers are interested in storing EHRs in third-party, semi-trusted cl... 详细信息
来源: 评论
A Post Quantum Key Policy attribute based encryption Scheme from Code based Cryptographic Assumptions  4th
A Post Quantum Key Policy Attribute Based Encryption Scheme ...
收藏 引用
4th International Conference on Advanced Network Technologies and Intelligent Computing-ANTIC-Annual
作者: Raju, Pratheeksha Chithralekha, T. Pondicherry Univ Dept Comp Sci Kalapet India
The security underpinnings of conventional cryptographic schemes are compromised by quantum computing which prompted advancements in public key cryptography for postquantum primitives and protocols that are immune to ... 详细信息
来源: 评论
A survey of lattice based expressive attribute based encryption
收藏 引用
COMPUTER SCIENCE REVIEW 2022年 第0期43卷 100438-100438页
作者: Fu, Xingbing Ding, Yong Li, Haifeng Ning, Jianting Wu, Ting Li, Fagen Hangzhou Dianzi Univ Sch Cyberspace Hangzhou 310018 Peoples R China Yibin Univ Fac Sci Yibin 644000 Peoples R China Guangxi Key Lab Cryptog & Informat Secur Gulin Guangxi Peoples R China Guangdong Prov Key Lab Informat Secur Technol Guangzhou Peoples R China Dalian Univ Technol Sch Software Dalian 116024 Peoples R China Fujian Normal Univ Coll Comp & Cyber Secur Fuzhou 350117 Peoples R China Univ Elect Sci & Technol China Sch Comp Sci & Engn Beijing Peoples R China
attribute based encryption (ABE) can be employed to enforce fine grained access control over encrypted data. Due to expressiveness, ABE schemes are currently employed in cloud computing and storage systems. The classi... 详细信息
来源: 评论
A systematic literature review of attribute based encryption in health services
收藏 引用
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES 2022年 第9期34卷 6743-6774页
作者: Imam, Raza Kumar, Kaushal Raza, Syed Mehran Sadaf, Rumi Anwer, Faisal Fatima, Noor Nadeem, Mohammad Abbas, Mohamed Rahman, Obaidur Aligarh Muslim Univ Dept Comp Sci Aligarh 202002 Uttar Pradesh India King Khalid Univ Coll Engn Elect Engn Dept Abha 61413 Asir Saudi Arabia Jamia Millia Islamia Dept Elect Engn New Delhi India Delta Univ Sci & Technol Coll Engn Comp & Commun Dept Gamasa 35712 Egypt
The widespread adoption of cloud technology in the healthcare industry has achieved effective outcomes in sharing health records and sensitive data. In recent years, many organizations have prioritized EHealth as thei... 详细信息
来源: 评论
Dually Computable Cryptographic Accumulators and Their Application to attribute based encryption  22nd
Dually Computable Cryptographic Accumulators and Their Appli...
收藏 引用
22nd International Conference on Cryptology and Network Security
作者: Barthoulot, Anais Blazy, Olivier Canard, Sebastien Orange Innovat Caen France Univ Limoges XLim Limoges France Ecole Polytech Palaiseau France Telecom Paris Palaiseau France
In 1993, Benaloh and De Mare introduced cryptographic accumulator, a primitive that allows the representation of a set of values by a short object (the accumulator) and offers the possibility to prove that some input ... 详细信息
来源: 评论
Multi-input attribute based encryption and Predicate encryption  42nd
Multi-input Attribute Based Encryption and Predicate Encrypt...
收藏 引用
42nd Annual International Cryptology Conference (CRYPTO)
作者: Agrawal, Shweta Yadav, Anshu Yamada, Shota IIT Madras Chennai Tamil Nadu India Natl Inst Adv Ind Sci & Technol Tokyo Japan
Motivated by several new and natural applications, we initiate the study of multi-input predicate encryption (miPE) and further develop multi-input attribute based encryption (miABE). Our contributions are: 1. Formali... 详细信息
来源: 评论
Energy efficient trust aware secure routing algorithm with attribute based encryption for wireless sensor networks
收藏 引用
Scientific Reports 2025年 第1期15卷 1-18页
作者: Selvi, M. Santhosh Kumar, S.V.N. Thangaramya, K. Abdul Gaffar, H. School of Computer Science and Engineering Vellore Institute of Technology Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
attribute-based encryption (ABE) is one of the public-key cryptographic techniques which enforces a new method of security through effective control of access on the data which is stored or communicated in encrypted f... 详细信息
来源: 评论
An Efficient Post-Quantum attribute-based encryption Scheme based on Rank Metric Codes for Cloud Computing
收藏 引用
IEEE ACCESS 2023年 11卷 99990-100000页
作者: Yousefipoor, Vahid Eghlidos, Taraneh Sharif Univ Technol Dept Elect Engn Tehran *** Iran Sharif Univ Technol Elect Res Inst Tehran *** Iran
attribute-based encryption is a valuable technique for ensuring data privacy and confidentiality in the realm of cloud computing. Using this cryptographic primitive, the data owner can securely store and share data wi... 详细信息
来源: 评论