咨询与建议

限定检索结果

文献类型

  • 651 篇 期刊文献
  • 390 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 1,044 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,012 篇 工学
    • 889 篇 计算机科学与技术...
    • 381 篇 电气工程
    • 300 篇 信息与通信工程
    • 182 篇 软件工程
    • 55 篇 电子科学与技术(可...
    • 51 篇 网络空间安全
    • 32 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 6 篇 机械工程
    • 6 篇 土木工程
    • 5 篇 石油与天然气工程
    • 3 篇 测绘科学与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 环境科学与工程(可...
  • 94 篇 理学
    • 57 篇 数学
    • 31 篇 化学
    • 27 篇 生物学
    • 6 篇 系统科学
    • 3 篇 统计学(可授理学、...
  • 50 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
    • 3 篇 公共管理
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 心理学(可授教育学...
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 1,044 篇 attribute-based ...
  • 256 篇 access control
  • 178 篇 cloud computing
  • 100 篇 blockchain
  • 73 篇 security
  • 73 篇 encryption
  • 64 篇 multi-authority
  • 60 篇 data sharing
  • 51 篇 privacy
  • 50 篇 revocation
  • 50 篇 searchable encry...
  • 49 篇 cloud storage
  • 47 篇 internet of thin...
  • 41 篇 cryptography
  • 36 篇 proxy re-encrypt...
  • 33 篇 ciphertext-polic...
  • 32 篇 fine-grained acc...
  • 32 篇 outsourced decry...
  • 28 篇 servers
  • 27 篇 fog computing

机构

  • 27 篇 xian univ posts ...
  • 24 篇 xidian univ sch ...
  • 22 篇 xidian univ stat...
  • 20 篇 state key lab cr...
  • 19 篇 chinese acad sci...
  • 17 篇 westone cryptol ...
  • 15 篇 xidian univ stat...
  • 15 篇 xidian univ sch ...
  • 13 篇 univ elect sci &...
  • 12 篇 singapore manage...
  • 11 篇 shanghai jiao to...
  • 11 篇 guangzhou univ s...
  • 11 篇 beijing univ pos...
  • 11 篇 beijing univ pos...
  • 9 篇 hohai univ coll ...
  • 9 篇 fuzhou univ coll...
  • 9 篇 univ elect sci &...
  • 9 篇 natl inst adv in...
  • 8 篇 guangzhou univ s...
  • 7 篇 xian univ techno...

作者

  • 26 篇 susilo willy
  • 24 篇 zhang yinghui
  • 19 篇 zheng dong
  • 19 篇 huang qinlong
  • 17 篇 mu yi
  • 17 篇 yang yixian
  • 17 篇 liu ximeng
  • 15 篇 li hui
  • 14 篇 deng robert h.
  • 14 篇 ning jianting
  • 13 篇 li jin
  • 13 篇 zhang leyou
  • 13 篇 chen xiaofeng
  • 12 篇 cao zhenfu
  • 12 篇 attrapadung nutt...
  • 11 篇 wang guojun
  • 11 篇 liang kaitai
  • 11 篇 zhang rui
  • 11 篇 liu zhenhua
  • 11 篇 li jiguo

语言

  • 1,024 篇 英文
  • 13 篇 其他
  • 8 篇 中文
检索条件"主题词=attribute-based encryption"
1044 条 记 录,以下是1-10 订阅
排序:
Two Practical attribute-based encryption Schemes for Privacy-Preserving Mobile Location-Sharing Applications
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2025年 第5期12卷 5148-5159页
作者: Chen, Zhenhua Li, Ni Huang, Luqi Jia, Xingxing Wang, Yilei Wang, Hao Su, Jing Xian Univ Sci & Technol Sch Comp Sci & Technol Xian 710054 Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Cryptog & Informat Secur Guilin 541004 Peoples R China Jinan Univ Coll Cyber Secur Guangzhou 510632 Peoples R China Univ Wollongong Sch Comp & Informat Technol Wollongong NSW 2522 Australia Lanzhou Univ Sch Math & Stat Lanzhou 730000 Peoples R China Qufu Normal Univ Sch Comp Sci Rizhao 276827 Peoples R China Shandong Normal Univ Sch Informat Sci & Engn Jinan 250061 Peoples R China
Location sharing, as an essential component of mobile applications, helps mobile users share location information and enhance their community connections. However, users may be reluctant to share their locations with ... 详细信息
来源: 评论
Levelled attribute-based encryption for hierarchical access control
收藏 引用
COMPUTER STANDARDS & INTERFACES 2025年 93卷
作者: Le, Huy Quoc Le, Phi Thuong Trinh, Sy Tuan Susilo, Willy Trinh, Viet Cuong Tan Tao Univ Sch Informat Technol Tan Tao Univ Ave Duc Hoa 82700 Long An Provinc Vietnam Hong Duc Univ Fac Informat & Commun Technol Dong Ve Ward Quang Trung St Thanh Hoa City 40130 Thanh Hoa Provi Vietnam Univ Wollongong Sch Informat Technol & Comp Northfields Ave Wollongong NSW 2522 Australia
attribute-based encryption (ABE) is an important primitive to address the problem of flexible one-to-many encryption. attribute-based encryption has found many practical applications such as cloud storage systems, fil... 详细信息
来源: 评论
GPABE: GPU-based Parallelization Framework for attribute-based encryption Schemes
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2025年 第3期36卷 520-536页
作者: Xu, Wenhan Ma, Hui Zhang, Rui Li, Jianhao Chinese Acad Sci Inst Informat Engn IIE State Key Lab Cyberspace Secur Def Beijing 100093 Peoples R China Univ Chinese Acad Sci Sch Cybersecur Beijing 100049 Peoples R China
attribute-based encryption (ABE) has emerged as a new paradigm for access control in cloud computing. However, despite the many promising features of ABE, its deployment in real-world systems is still limited, partial... 详细信息
来源: 评论
TSR-ABE: Traceable and Server-Aided Revocable Ciphertext-Policy attribute-based encryption Under Static Assumptions
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2025年 20卷 955-967页
作者: Meng, Fei Cheng, Leixiao Shandong Univ Sch Cyber Sci & Technol Qingdao 266237 Peoples R China Shandong Univ Sch Cyber Sci & Technol Qingdao 266237 Peoples R China
The cloud server is a versatile platform for data storage, with users increasingly uploading personal data to public servers to circumvent costly local storage. However, the server is not entirely honest, as it may po... 详细信息
来源: 评论
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage
收藏 引用
COMPUTER STANDARDS & INTERFACES 2025年 91卷
作者: Li, Ximing Wang, Hao Ma, Sha South China Agr Univ Coll Math & Informat Guangzhou 510000 Guangdong Peoples R China
The encryption of user data is crucial when employing cloud storage services to guarantee the security of these data stored on cloud servers. attribute -based encryption (ABE) scheme is considered a powerful encryptio... 详细信息
来源: 评论
A comprehensive framework for secure keyword search in cloud databases through hybrid attribute-based encryption (HABE)
收藏 引用
International Journal of Information Technology (Singapore) 2025年 1-6页
作者: Arundathi, J.V.S. Satyanarayana, K.V.V. Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation (KLEF) Vaddeswaram Guntur District Andhra Pradesh Guntur India
Efficient keyword search in encrypted databases is critical in cloud computing due to its computational memory and time constraints. Traditional keyword search methods often employ plaintext attributes and policies wi... 详细信息
来源: 评论
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare
收藏 引用
COMPUTER STANDARDS & INTERFACES 2025年 92卷
作者: Dai, Yue Xue, Lulu Yang, Bo Wang, Tao Zhang, Kejia Heilongjiang Univ Sch Math Sci Harbin 150080 Peoples R China Shaanxi Normal Univ Sch Comp Sci Xian 710119 Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Peoples R China Guizhou Univ State Key Lab Publ Big Data Guiyang 550000 Peoples R China
Smart healthcare is an emerging technology for enabling interaction between patients and medical personnel, medical institutions, and medical devices utilizing advanced Internet of Things (IoT) technologies. It has at... 详细信息
来源: 评论
Verifiable and auditable multi-authority attribute-based encryption
收藏 引用
COMPUTER STANDARDS & INTERFACES 2025年 94卷
作者: Wang, Xingwang Zeng, Peng Luo, Jiaying East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai 200062 Peoples R China
attribute-based encryption (ABE) is crucial for cloud computing security as it enables fine-grained non- interactive access control and allows efficient and secure data sharing without relying on trusted third parties... 详细信息
来源: 评论
Location Data Sharing Method based on Blockchain and attribute-based encryption  6th
Location Data Sharing Method Based on Blockchain and Attri...
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Sun, Xueping Liu, Peng Liao, Bingjie He, Qian State and Local Joint Engineering Research Center for Satellite Navigation and Location Service Guilin University of Electronic Technology Guilin541004 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
With the development of communication technology and the prevalence of mobile smart devices, location-based services have been widely applied in various scenarios. However, the data typically provided by location-base... 详细信息
来源: 评论
Efficient attribute-based Searchable encryption With Policy Hiding Over Personal Health Records
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2025年 第2期22卷 1299-1312页
作者: Zhang, Boyu Yang, Wenjie Zhang, Futai Ning, Jianting Fujian Normal Univ Coll Comp & Cyber Secur Fuzhou 350117 Peoples R China Fujian Normal Univ Coll Comp & Cyber Secur Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Peoples R China Fujian Normal Univ Coll Comp & Cyber Secur Key Lab Analyt Math & Applicat Minist Educ Fuzhou 350007 Peoples R China City Univ Macau Fac Data Sci Macau Peoples R China
Due to the introduction of cloud computing in healthcare services, personal health records (PHRs) have being uploaded to cloud servers in increasing numbers. Since data confidentiality requirements exist, data owners ... 详细信息
来源: 评论