咨询与建议

限定检索结果

文献类型

  • 651 篇 期刊文献
  • 390 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 1,044 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,012 篇 工学
    • 889 篇 计算机科学与技术...
    • 381 篇 电气工程
    • 300 篇 信息与通信工程
    • 182 篇 软件工程
    • 55 篇 电子科学与技术(可...
    • 51 篇 网络空间安全
    • 32 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 6 篇 机械工程
    • 6 篇 土木工程
    • 5 篇 石油与天然气工程
    • 3 篇 测绘科学与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 环境科学与工程(可...
  • 94 篇 理学
    • 57 篇 数学
    • 31 篇 化学
    • 27 篇 生物学
    • 6 篇 系统科学
    • 3 篇 统计学(可授理学、...
  • 50 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
    • 3 篇 公共管理
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 心理学(可授教育学...
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 1,044 篇 attribute-based ...
  • 256 篇 access control
  • 178 篇 cloud computing
  • 100 篇 blockchain
  • 73 篇 security
  • 73 篇 encryption
  • 64 篇 multi-authority
  • 60 篇 data sharing
  • 51 篇 privacy
  • 50 篇 revocation
  • 50 篇 searchable encry...
  • 49 篇 cloud storage
  • 47 篇 internet of thin...
  • 41 篇 cryptography
  • 36 篇 proxy re-encrypt...
  • 33 篇 ciphertext-polic...
  • 32 篇 fine-grained acc...
  • 32 篇 outsourced decry...
  • 28 篇 servers
  • 27 篇 fog computing

机构

  • 27 篇 xian univ posts ...
  • 24 篇 xidian univ sch ...
  • 22 篇 xidian univ stat...
  • 20 篇 state key lab cr...
  • 19 篇 chinese acad sci...
  • 17 篇 westone cryptol ...
  • 15 篇 xidian univ stat...
  • 15 篇 xidian univ sch ...
  • 13 篇 univ elect sci &...
  • 12 篇 singapore manage...
  • 11 篇 shanghai jiao to...
  • 11 篇 guangzhou univ s...
  • 11 篇 beijing univ pos...
  • 11 篇 beijing univ pos...
  • 9 篇 hohai univ coll ...
  • 9 篇 fuzhou univ coll...
  • 9 篇 univ elect sci &...
  • 9 篇 natl inst adv in...
  • 8 篇 guangzhou univ s...
  • 7 篇 xian univ techno...

作者

  • 26 篇 susilo willy
  • 24 篇 zhang yinghui
  • 19 篇 zheng dong
  • 19 篇 huang qinlong
  • 17 篇 mu yi
  • 17 篇 yang yixian
  • 17 篇 liu ximeng
  • 15 篇 li hui
  • 14 篇 deng robert h.
  • 14 篇 ning jianting
  • 13 篇 li jin
  • 13 篇 zhang leyou
  • 13 篇 chen xiaofeng
  • 12 篇 cao zhenfu
  • 12 篇 attrapadung nutt...
  • 11 篇 wang guojun
  • 11 篇 liang kaitai
  • 11 篇 zhang rui
  • 11 篇 liu zhenhua
  • 11 篇 li jiguo

语言

  • 1,024 篇 英文
  • 13 篇 其他
  • 8 篇 中文
检索条件"主题词=attribute-based encryption"
1044 条 记 录,以下是91-100 订阅
排序:
Secure access privilege delegation using attribute-based encryption
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2023年 第5期22卷 1261-1276页
作者: Panda, Suryakanta Mondal, Samrat Das, Ashok Kumar Susilo, Willy Indian Inst Technol Patna Dept Comp Sci & Engn Bihta India Int Inst Informat Technol Ctr Secur Theory & Algorithm Res Hyderabad India Univ Wollongong Inst Cybersecur & Cryptol Wollongong Australia
attribute-based encryption (ABE) is widely used for a secure and efficient data sharing. The predetermined access policy of ABE shares the data with intended data users. However, ABE is not preferable in many applicat... 详细信息
来源: 评论
White-Box Traceable Ciphertext-Policy attribute-based encryption Supporting Any Monotone Access Structures
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2013年 第1期8卷 76-88页
作者: Liu, Zhen Cao, Zhenfu Wong, Duncan S. Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China City Univ Hong Kong Dept Comp Sci Kowloon Hong Kong Peoples R China
In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users. Given a decryption key, it may not be always possible to trace to the original k... 详细信息
来源: 评论
Semantic attribute-based encryption: A framework for combining ABE schemes with semantic technologies
收藏 引用
INFORMATION SCIENCES 2022年 616卷 558-576页
作者: Arshad, Hamed Johansen, Christian Owe, Olaf Picazo-Sanchez, Pablo Schneider, Gerardo Univ Oslo Dept Informat Oslo Norway Norwegian Univ Sci & Technol Oslo Norway Chalmers Univ Technol Gothenburg Sweden Univ Gothenburg Dept Comp Sci & Engn Gothenburg Sweden
attribute-based encryption (ABE) is a cryptographic solution to protect resources in a finegrained manner based on a set of public attributes. This is similar to attribute-based access control schemes in the sense tha... 详细信息
来源: 评论
Comments on "Verifiable and Exculpable Outsourced attribute-based encryption for Access Control in Cloud Computing"
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2017年 第4期14卷 461-462页
作者: Xiong, Hu Sun, Jianfei Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610051 Peoples R China
Recently in IEEE Transactions on Dependable and Secure Computing (TDSC) (doi: 10.1109/TDSC.2015.2499755), Ma et al. proposed a new construction of attribute-based encryption (ABE) which can outsource the complicated e... 详细信息
来源: 评论
attribute-based encryption in the Generic Group Model: Automated Proofs and New Constructions  17
Attribute-Based Encryption in the Generic Group Model: Autom...
收藏 引用
24th ACM-SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Ambrona, Miguel Barthe, Gilles Gay, Romain Wee, Hoeteck IMDEA Software Inst Madrid Spain Univ Politecn Madrid Madrid Spain ENS Paris France CNRS Paris France
attribute-based encryption (ABE) is a cryptographic primitive which supports fine-grained access control on encrypted data, making it an appealing building block for many applications. In this paper, we propose, imple... 详细信息
来源: 评论
A Hybrid attribute-based encryption Technique Supporting Expressive Policies and Dynamic attributes
收藏 引用
INFORMATION SECURITY JOURNAL 2012年 第6期21卷 297-305页
作者: Weber, Stefan G. Ctr Adv Secur Res CASED Mornewegstr32 D-64293 Darmstadt Germany
This article proposes a novel hybrid attribute-based encryption technique. It is attribute-based, as it allows encrypting under logical combinations of attributes, that is, properties that users satisfy. It is hybrid,... 详细信息
来源: 评论
Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices
收藏 引用
COMPUTER COMMUNICATIONS 2019年 145卷 113-125页
作者: Malluhi, Q. M. Shikfa, A. Tran, V. D. Trinh, V. C. Qatar Univ Coll Engn Doha Qatar Hanoi Univ Sci & Technol Hanoi Vietnam Hong Duc Univ Thanh Hoa Vietnam
In a traditional attribute-based encryption (ABE) system, there is only one central authority who generates and hence knows the secret keys of all users, this problem is known as the key escrow problem. An ABE scheme ... 详细信息
来源: 评论
Expressive ciphertext-policy attribute-based encryption with direct user revocation
收藏 引用
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS 2017年 第6期9卷 495-504页
作者: Bai, Cuicui Zhang, Yinghui Ma, Hua Liu, Zhenhua Xidian Univ Sch Math & Stat Xian 710071 Shaanxi Peoples R China Xian Univ Posts & Telecommun Natl Engn Lab Wireless Secur Xian 710121 Shaanxi Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China
attribute-based encryption enables fine-grained access control on sensitive data with a specific user set. However, traditional ABE schemes cannot satisfy practical requirements of data sharing applications where user... 详细信息
来源: 评论
Privacy Preserving System for Integrated Broadcast-broadband Services using attribute-based encryption
收藏 引用
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS 2015年 第3期61卷 328-335页
作者: Ohtake, Go Ogawa, Kazuto Safavi-Naini, Reihaneh NHK Japan Broadcasting Corp Sci & Technol Res Labs Tokyo Japan Univ Calgary Dept Comp Sci Calgary AB T2N 1N4 Canada
A number of integrated broadcast-broadband services have recently been launched which allow the viewers to receive the content via the airwaves together with additional information about the content via the Internet. ... 详细信息
来源: 评论
Designing cloud-based electronic health record system with attribute-based encryption
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2015年 第10期74卷 3441-3458页
作者: Xhafa, Fatos Li, Jingwei Zhao, Gansen Li, Jin Chen, Xiaofeng Wong, Duncan S. Univ Politecn Cataluna Dept Llenguatges & Sistemes Informat Barcelona Spain Nankai Univ Coll Informat Tech Sci Tianjin 300071 Peoples R China S China Normal Univ Sch Comp Sci Guangzhou Guangdong Peoples R China Guangzhou Univ Sch Comp Sci Guangzhou Guangdong Peoples R China Xidian Univ State Key Lab Integrated Serv Networks ISN Xian Peoples R China City Univ Hong Kong Dept Comp Sci Kowloon Hong Kong Peoples R China
With the development of cloud computing, electronic health record (EHR) system has appeared in the form of patient-centric, in which patients store their personal health records (PHRs) at a remote cloud server and sel... 详细信息
来源: 评论