咨询与建议

限定检索结果

文献类型

  • 652 篇 期刊文献
  • 390 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 1,045 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,013 篇 工学
    • 889 篇 计算机科学与技术...
    • 379 篇 电气工程
    • 301 篇 信息与通信工程
    • 179 篇 软件工程
    • 56 篇 电子科学与技术(可...
    • 52 篇 网络空间安全
    • 33 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 6 篇 机械工程
    • 6 篇 土木工程
    • 5 篇 石油与天然气工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 测绘科学与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 动力工程及工程热...
  • 94 篇 理学
    • 57 篇 数学
    • 32 篇 化学
    • 27 篇 生物学
    • 6 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
  • 50 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
    • 3 篇 公共管理
  • 15 篇 军事学
    • 15 篇 军队指挥学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 心理学(可授教育学...
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 1,045 篇 attribute-based ...
  • 257 篇 access control
  • 177 篇 cloud computing
  • 100 篇 blockchain
  • 73 篇 encryption
  • 72 篇 security
  • 64 篇 multi-authority
  • 60 篇 data sharing
  • 50 篇 revocation
  • 50 篇 searchable encry...
  • 49 篇 cloud storage
  • 49 篇 privacy
  • 45 篇 internet of thin...
  • 40 篇 cryptography
  • 37 篇 proxy re-encrypt...
  • 34 篇 ciphertext-polic...
  • 32 篇 fine-grained acc...
  • 32 篇 outsourced decry...
  • 28 篇 servers
  • 27 篇 fog computing

机构

  • 27 篇 xian univ posts ...
  • 24 篇 xidian univ sch ...
  • 21 篇 xidian univ stat...
  • 20 篇 state key lab cr...
  • 19 篇 chinese acad sci...
  • 17 篇 westone cryptol ...
  • 15 篇 xidian univ stat...
  • 14 篇 xidian univ sch ...
  • 13 篇 univ elect sci &...
  • 12 篇 singapore manage...
  • 11 篇 shanghai jiao to...
  • 11 篇 guangzhou univ s...
  • 11 篇 beijing univ pos...
  • 11 篇 beijing univ pos...
  • 9 篇 hohai univ coll ...
  • 9 篇 fuzhou univ coll...
  • 9 篇 univ elect sci &...
  • 9 篇 natl inst adv in...
  • 8 篇 guangzhou univ s...
  • 7 篇 xian univ techno...

作者

  • 26 篇 susilo willy
  • 24 篇 zhang yinghui
  • 19 篇 zheng dong
  • 19 篇 huang qinlong
  • 17 篇 mu yi
  • 17 篇 yang yixian
  • 17 篇 liu ximeng
  • 15 篇 li hui
  • 14 篇 deng robert h.
  • 14 篇 ning jianting
  • 13 篇 li jin
  • 13 篇 zhang leyou
  • 13 篇 chen xiaofeng
  • 12 篇 cao zhenfu
  • 12 篇 attrapadung nutt...
  • 11 篇 wang guojun
  • 11 篇 liang kaitai
  • 11 篇 zhang rui
  • 11 篇 liu zhenhua
  • 11 篇 li jiguo

语言

  • 1,026 篇 英文
  • 12 篇 其他
  • 8 篇 中文
检索条件"主题词=attribute-based encryption"
1045 条 记 录,以下是101-110 订阅
排序:
Puncturable attribute-based encryption From Lattices for Classified Document Sharing
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 4028-4042页
作者: Yang, Mengxue Wang, Huaqun He, Debiao Nanjing Univ Posts & Telecommun Coll Comp Nanjing 210003 Peoples R China Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Peoples R China
The country's governmental agencies bear the responsibility for overseeing and executing a wide range of national policies and initiatives, formulating pivotal determinations aimed at safeguarding national securit... 详细信息
来源: 评论
Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
收藏 引用
SOFT COMPUTING 2018年 第1期22卷 243-251页
作者: Zhong, Hong Zhu, Wenlong Xu, Yan Cui, Jie Anhui Univ Sch Comp Sci & Technol Hefei Anhui Peoples R China
For realizing the flexible, scalable and fuzzy fine-grained access control, ciphertext policy attribute-based encryption (CP-ABE) scheme has been widely used in the cloud storage system. However, the access structure ... 详细信息
来源: 评论
White-Box Traceable Ciphertext-Policy attribute-based encryption Supporting Flexible attributes
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2015年 第6期10卷 1274-1288页
作者: Ning, Jianting Dong, Xiaolei Cao, Zhenfu Wei, Lifei Lin, Xiaodong Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China E China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai 200062 Peoples R China Shanghai Ocean Univ Coll Informat Technol Shanghai 201306 Peoples R China Univ Ontario Inst Technol Fac Business & Informat Technol Oshawa ON L1H 7K4 Canada
Ciphertext-policy attribute-based encryption (CP-ABE) enables fine-grained access control to the encrypted data for commercial applications. There has been significant progress in CP-ABE over the recent years because ... 详细信息
来源: 评论
A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing
收藏 引用
JOURNAL OF SUPERCOMPUTING 2024年 第18期80卷 26614-26657页
作者: Rezapour, Ronita Asghari, Parvaneh Javadi, Hamid Haj Seyyed Ghanbari, Shamsollah Islamic Azad Univ Qom Branch Dept Comp Engn Qom Iran Islamic Azad Univ Cent Tehran Branch Dept Comp Engn Tehran Iran Shahed Univ Dept Comp Engn Tehran Iran Islamic Azad Univ Ashtian Branch Dept Comp Engn Ashtian Iran
Fog computing is a revolutionary technology that, by expanding the cloud computing paradigm to the network edge, brings a significant achievement in the resource-constrained IoT applications in intelligent environment... 详细信息
来源: 评论
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
收藏 引用
INFORMATION SCIENCES 2014年 275卷 370-384页
作者: Deng, Hua Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Zhang, Lei Liu, Jianwei Shi, Wenchang Wuhan Univ Sch Comp Wuhan 430072 Peoples R China Beihang Univ Sch Elect & Informat Engn Beijing 100191 Peoples R China Renmin Univ China Sch Informat Beijing Peoples R China Univ Rovira & Virgili Dept Comp Engn & Math Catalonia Spain E China Normal Univ Inst Software Engn Shanghai 200062 Peoples R China
attribute-based encryption (ABE) systems allow encrypting to uncertain receivers by means of an access policy specifying the attributes that the intended receivers should possess. ABE promises to deliver fine-grained ... 详细信息
来源: 评论
White-Box Traceable Ciphertext-Policy attribute-based encryption Supporting Any Monotone Access Structures
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2013年 第1期8卷 76-88页
作者: Liu, Zhen Cao, Zhenfu Wong, Duncan S. Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China City Univ Hong Kong Dept Comp Sci Kowloon Hong Kong Peoples R China
In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users. Given a decryption key, it may not be always possible to trace to the original k... 详细信息
来源: 评论
Blind attribute-based encryption and oblivious transfer with fine-grained access control
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2016年 第2期81卷 179-223页
作者: Rial, Alfredo IBM Res Zurich Ruschlikon Switzerland
We propose two constructions of oblivious transfer with access control (OTAC), i.e., oblivious transfer schemes in which a receiver can obtain a message only if her attributes, which are certified by a credential issu... 详细信息
来源: 评论
Semantic attribute-based encryption: A framework for combining ABE schemes with semantic technologies
收藏 引用
INFORMATION SCIENCES 2022年 616卷 558-576页
作者: Arshad, Hamed Johansen, Christian Owe, Olaf Picazo-Sanchez, Pablo Schneider, Gerardo Univ Oslo Dept Informat Oslo Norway Norwegian Univ Sci & Technol Oslo Norway Chalmers Univ Technol Gothenburg Sweden Univ Gothenburg Dept Comp Sci & Engn Gothenburg Sweden
attribute-based encryption (ABE) is a cryptographic solution to protect resources in a finegrained manner based on a set of public attributes. This is similar to attribute-based access control schemes in the sense tha... 详细信息
来源: 评论
Server-aided revocable attribute-based encryption for cloud computing services
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2020年 第14期32卷
作者: Cui, Hui Yuen, Tsz Hon Deng, Robert H. Wang, Guilin Murdoch Univ Discipline Informat Technol Math & Stat Perth WA Australia Univ Hong Kong Dept Comp Sci Hong Kong Peoples R China Singapore Management Univ Singapore Singapore Huawei Int Pte Ltd Singapore Singapore
attribute-based encryption (ABE) has been regarded as a promising solution in cloud computing services to enable scalable access control without compromising the security. Despite of the advantages, efficient user rev... 详细信息
来源: 评论
Secure Federated Cloud Storage Protection Strategy Using Hybrid Heuristic attribute-based encryption With Permissioned Blockchain
收藏 引用
IEEE ACCESS 2024年 12卷 117154-117169页
作者: Kathole, Atul B. Vhatkar, Kapil Netaji Goyal, Ankur Kaushik, Shivkant Mirge, Amita Sanjiv Jain, Prince Soliman, Mohamed S. Islam, Mohammad Tariqul Dr DY Patil Inst Technol Dept Comp Engn Pune 411018 India Symbiosis Int Symbiosis Inst Technol Dept Comp Sci & Engn Pune 412115 Maharashtra India Greater Noida Inst Technol GNIOT Dept Comp Sci & Engn AI & DS Greater Noida 201310 Uttar Pradesh India Pimpri Chinchwad Coll Engn Dept IT Pune 411044 Maharashtra India Parul Univ Parul Inst Technol Dept Mechatron Engn Vadodara 391760 Gujarat India Taif Univ Coll Engn Dept Elect Engn Taif 21944 Saudi Arabia UKM Fac Engn & Built Environm Dept Elect Elect & Syst Engn Bangi 43600 Selangor Malaysia
The rapid growth of the Internet of Medical Things (IoMT) has introduced significant security and privacy challenges in managing and protecting medical data. This paper proposes a secure federated cloud storage system... 详细信息
来源: 评论