咨询与建议

限定检索结果

文献类型

  • 660 篇 期刊文献
  • 399 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 1,061 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,030 篇 工学
    • 906 篇 计算机科学与技术...
    • 389 篇 电气工程
    • 310 篇 信息与通信工程
    • 187 篇 软件工程
    • 59 篇 网络空间安全
    • 58 篇 电子科学与技术(可...
    • 39 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 18 篇 交通运输工程
    • 7 篇 机械工程
    • 7 篇 安全科学与工程
    • 6 篇 土木工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 石油与天然气工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 测绘科学与技术
  • 99 篇 理学
    • 59 篇 数学
    • 33 篇 化学
    • 28 篇 生物学
    • 6 篇 系统科学
    • 4 篇 物理学
    • 3 篇 统计学(可授理学、...
  • 56 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 3 篇 工商管理
    • 3 篇 公共管理
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 心理学(可授教育学...
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 1,061 篇 attribute-based ...
  • 257 篇 access control
  • 178 篇 cloud computing
  • 102 篇 blockchain
  • 74 篇 security
  • 74 篇 encryption
  • 66 篇 multi-authority
  • 61 篇 data sharing
  • 50 篇 revocation
  • 50 篇 searchable encry...
  • 49 篇 cloud storage
  • 49 篇 privacy
  • 47 篇 internet of thin...
  • 41 篇 cryptography
  • 35 篇 proxy re-encrypt...
  • 34 篇 ciphertext-polic...
  • 32 篇 fine-grained acc...
  • 32 篇 outsourced decry...
  • 29 篇 servers
  • 27 篇 fog computing

机构

  • 27 篇 xian univ posts ...
  • 24 篇 xidian univ sch ...
  • 22 篇 xidian univ stat...
  • 20 篇 state key lab cr...
  • 19 篇 chinese acad sci...
  • 17 篇 westone cryptol ...
  • 15 篇 xidian univ stat...
  • 15 篇 xidian univ sch ...
  • 13 篇 univ elect sci &...
  • 12 篇 singapore manage...
  • 11 篇 shanghai jiao to...
  • 11 篇 guangzhou univ s...
  • 11 篇 beijing univ pos...
  • 11 篇 beijing univ pos...
  • 10 篇 natl inst adv in...
  • 9 篇 hohai univ coll ...
  • 9 篇 fuzhou univ coll...
  • 9 篇 univ elect sci &...
  • 8 篇 guangzhou univ s...
  • 7 篇 beihang univ sch...

作者

  • 27 篇 susilo willy
  • 24 篇 zhang yinghui
  • 19 篇 zheng dong
  • 19 篇 huang qinlong
  • 17 篇 mu yi
  • 17 篇 liu ximeng
  • 16 篇 yang yixian
  • 15 篇 li hui
  • 14 篇 deng robert h.
  • 14 篇 ning jianting
  • 13 篇 li jin
  • 13 篇 zhang leyou
  • 13 篇 attrapadung nutt...
  • 13 篇 chen xiaofeng
  • 12 篇 cao zhenfu
  • 11 篇 wang guojun
  • 11 篇 liang kaitai
  • 11 篇 zhang rui
  • 11 篇 liu zhenhua
  • 11 篇 li jiguo

语言

  • 1,031 篇 英文
  • 23 篇 其他
  • 8 篇 中文
检索条件"主题词=attribute-based encryption"
1061 条 记 录,以下是141-150 订阅
排序:
Fine-Grained Secure attribute-based encryption  41st
Fine-Grained Secure Attribute-Based Encryption
收藏 引用
41st Annual International Cryptology Conference (CRYPTO)
作者: Wang, Yuyu Pan, Jiaxin Chen, Yu Univ Elect Sci & Technol China Chengdu Peoples R China NTNU Norwegian Univ Sci & Technol Dept Math Sci Trondheim Norway Shandong Univ Sch Cyber Sci & Technol Qingdao 266237 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Shandong Univ Key Lab Cryptol Technol & Informat Secur Minist Educ Qingdao 266237 Peoples R China
Fine-grained cryptography is constructing cryptosystems in a setting where an adversary's resource is a-prior bounded and an honest party has less resource than an adversary. Currently, only simple form of encrypt... 详细信息
来源: 评论
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud
收藏 引用
JOURNAL OF SUPERCOMPUTING 2020年 第7期76卷 4884-4903页
作者: Guo, Rui Li, Xiong Zheng, Dong Zhang, Yinghui Xian Univ Posts & Telecommun Natl Engn Lab Wireless Secur Xian 710121 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Hunan Univ Sci & Technol Sch Comp Sci & Engn Xiangtan 411201 Peoples R China Westone Cryptol Res Ctr Beijing 100070 Peoples R China
In the personal health record (PHR) system, the patient's health records are usually outsourced to a large database, such as the cloud service provider. In order to guarantee the confidentiality of this data , ach... 详细信息
来源: 评论
Generic Construction of Adaptively Secure Anonymous Key-Policy attribute-based encryption from Public-Key Searchable encryption
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2020年 第1期E103A卷 107-113页
作者: Hayata, Junichiro Ishizaka, Masahito Sakai, Yusuke Hanaoka, Goichiro Matsuura, Kanta Univ Tokyo Tokyo 1538505 Japan Natl Inst Adv Ind Sci & Technol Tokyo 1350064 Japan KDDI Res Inc Publ Key Cryptosyst Fujimino Japan
Public-key encryption with keyword search (PEKS) is a cryptographic primitive that allows us to search for particular keywords over ciphertexts without recovering plaintexts. By using PEKS in cloud services, users can... 详细信息
来源: 评论
Cost-Efficient Outsourced Decryption of attribute-based encryption Schemes for Both Users and Cloud Server in Green Cloud Computing
收藏 引用
IEEE ACCESS 2020年 8卷 20862-20869页
作者: Liao, Yongjian Zhang, Ganglin Chen, Hongjie Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Peoples R China
To reduce a user's decryption cost and protect the private information from being leaked, Green et al. proposed an approach oursourcing the decryption of the attribute based encryption (ABE) scheme to the cloud se... 详细信息
来源: 评论
Server-aided revocable attribute-based encryption for cloud computing services
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2020年 第14期32卷 e5680-e5680页
作者: Cui, Hui Yuen, Tsz Hon Deng, Robert H. Wang, Guilin Murdoch Univ Discipline Informat Technol Math & Stat Perth WA Australia Univ Hong Kong Dept Comp Sci Hong Kong Peoples R China Singapore Management Univ Singapore Singapore Huawei Int Pte Ltd Singapore Singapore
attribute-based encryption (ABE) has been regarded as a promising solution in cloud computing services to enable scalable access control without compromising the security. Despite of the advantages, efficient user rev... 详细信息
来源: 评论
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2020年 第11期11卷 4613-4641页
作者: Pournaghi, Seyed Morteza Bayat, Majid Farjami, Yaghoub Univ Qom Dept Comp Engn Qom Iran Shahed Univ Dept Comp Engn Tehran Iran
The development of Electronic Information Technology has made the Electronic Medical Record a commonly used approach to recording and categorizing medical patient data in databases of different hospitals and medical e... 详细信息
来源: 评论
A lightweight and scalable attribute-based encryption system for smart cities
收藏 引用
COMPUTER COMMUNICATIONS 2020年 149卷 78-89页
作者: Rasori, Marco Perazzo, Pericle Dini, Gianluca Univ Pisa Dept Informat Engn Pisa Italy
In the near future, a technological revolution will involve our cities, where a variety of smart services based on the Internet of Things will be developed to facilitate the needs of the citizens. Sensing devices are ... 详细信息
来源: 评论
Decentralized attribute-based encryption and Signatures
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2020年 第1期E103A卷 41-73页
作者: Okamoto, Tatsuaki Takashima, Katsuyuki NTT Res Inc East Palo Alto CA USA Mitsubishi Electr Corp Informat Technol R&D Ctr Kamakura Kanagawa 2478501 Japan
This paper presents decentralized multi-authority attribute-based encryption and signature (DMA-ABE and DMA-ABS) schemes, in which no central authority exists and no global coordination is required except for the sett... 详细信息
来源: 评论
CCA-Secure attribute-based encryption Supporting Dynamic Membership in the Standard Model
CCA-Secure Attribute-Based Encryption Supporting Dynamic Mem...
收藏 引用
IEEE Conference on Dependable and Secure Computing (DSC)
作者: Fan, Chun-, I Tseng, Yi-Fan Feng, Cheng-Chun Natl Sun Yat Sen Univ Informat Secur Res Ctr Intelligent Elect Commerce Res Ctr Dept Comp Sci & Engn Kaohsiung Taiwan Natl Chengchi Univ Dept Comp Sci Taipei Taiwan Natl Sun Yat Sen Univ Dept Comp Sci & Engn Kaohsiung Taiwan
attribute-based encryption (ABE) is an access control mechanism where a sender encrypts messages according to an attribute set for multiple receivers. With fine-grained access control, it has been widely applied to cl... 详细信息
来源: 评论
Efficient ciphertext-policy attribute-based encryption with blackbox traceability
收藏 引用
INFORMATION SCIENCES 2020年 538卷 19-38页
作者: Xu, Shengmin Yuan, Jiaming Xu, Guowen Li, Yingjiu Liu, Ximeng Zhang, Yinghui Ying, Zuobin Fujian Normal Univ Coll Math & Informat Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350007 Peoples R China Singapore Management Univ Secure Mobile Ctr Sch Informat Syst Singapore 178902 Singapore Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Sichuan Peoples R China Fuzhou Univ Coll Math & Comp Sci Fuzhou 350108 Peoples R China Xian Univ Posts & Telecommun Natl Engn Lab Wireless Secur Xian 710121 Peoples R China Anhui Univ Sch Comp Sci & Technol Hefei 230601 Anhui Peoples R China
Traitor tracing scheme is a paradigm to classify the users who illegal use of their decryption keys in cryptosystems. In the ciphertext-policy attribute-based cryptosystem, the decryption key usually contains the user... 详细信息
来源: 评论