咨询与建议

限定检索结果

文献类型

  • 651 篇 期刊文献
  • 390 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 1,044 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,012 篇 工学
    • 889 篇 计算机科学与技术...
    • 381 篇 电气工程
    • 300 篇 信息与通信工程
    • 182 篇 软件工程
    • 55 篇 电子科学与技术(可...
    • 51 篇 网络空间安全
    • 32 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 6 篇 机械工程
    • 6 篇 土木工程
    • 5 篇 石油与天然气工程
    • 3 篇 测绘科学与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 环境科学与工程(可...
  • 94 篇 理学
    • 57 篇 数学
    • 31 篇 化学
    • 27 篇 生物学
    • 6 篇 系统科学
    • 3 篇 统计学(可授理学、...
  • 50 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
    • 3 篇 公共管理
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 心理学(可授教育学...
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 1,044 篇 attribute-based ...
  • 256 篇 access control
  • 178 篇 cloud computing
  • 100 篇 blockchain
  • 73 篇 security
  • 73 篇 encryption
  • 64 篇 multi-authority
  • 60 篇 data sharing
  • 51 篇 privacy
  • 50 篇 revocation
  • 50 篇 searchable encry...
  • 49 篇 cloud storage
  • 47 篇 internet of thin...
  • 41 篇 cryptography
  • 36 篇 proxy re-encrypt...
  • 33 篇 ciphertext-polic...
  • 32 篇 fine-grained acc...
  • 32 篇 outsourced decry...
  • 28 篇 servers
  • 27 篇 fog computing

机构

  • 27 篇 xian univ posts ...
  • 24 篇 xidian univ sch ...
  • 22 篇 xidian univ stat...
  • 20 篇 state key lab cr...
  • 19 篇 chinese acad sci...
  • 17 篇 westone cryptol ...
  • 15 篇 xidian univ stat...
  • 15 篇 xidian univ sch ...
  • 13 篇 univ elect sci &...
  • 12 篇 singapore manage...
  • 11 篇 shanghai jiao to...
  • 11 篇 guangzhou univ s...
  • 11 篇 beijing univ pos...
  • 11 篇 beijing univ pos...
  • 9 篇 hohai univ coll ...
  • 9 篇 fuzhou univ coll...
  • 9 篇 univ elect sci &...
  • 9 篇 natl inst adv in...
  • 8 篇 guangzhou univ s...
  • 7 篇 xian univ techno...

作者

  • 26 篇 susilo willy
  • 24 篇 zhang yinghui
  • 19 篇 zheng dong
  • 19 篇 huang qinlong
  • 17 篇 mu yi
  • 17 篇 yang yixian
  • 17 篇 liu ximeng
  • 15 篇 li hui
  • 14 篇 deng robert h.
  • 14 篇 ning jianting
  • 13 篇 li jin
  • 13 篇 zhang leyou
  • 13 篇 chen xiaofeng
  • 12 篇 cao zhenfu
  • 12 篇 attrapadung nutt...
  • 11 篇 wang guojun
  • 11 篇 liang kaitai
  • 11 篇 zhang rui
  • 11 篇 liu zhenhua
  • 11 篇 li jiguo

语言

  • 1,024 篇 英文
  • 13 篇 其他
  • 8 篇 中文
检索条件"主题词=attribute-based encryption"
1044 条 记 录,以下是31-40 订阅
排序:
attribute-based encryption with Authentication Provider in FIWARE Platform  12
Attribute-Based Encryption with Authentication Provider in F...
收藏 引用
12th International IEEE Scientific and Technical Conference on Dynamics of Systems, Mechanisms and Machines (Dynamics)
作者: Ponomarev, K. Y. Nissenbaum, O. V. Univ Tyumen Dept Informat Secur Tyumen Russia
This paper aims at presenting the approach for the process of attributes verification in the attribute-based encryption schemes. We considered ABE methods in the Internet of Things environment. The main idea is to all... 详细信息
来源: 评论
attribute-based encryption with Flexible Revocation for IoV  18
Attribute-based Encryption with Flexible Revocation for IoV
收藏 引用
18th International Conference on Future Networks and Communications (FNC) / 20th International Conference on Mobile Systems and Pervasive Computing (MobiSPC) / 13th International Conference on Sustainable Energy Information Technology (SEIT)
作者: Chen, Ruoyu Li, Yuhong Rahmani, Rahim Beijing Univ Posts & Telecommun Sch Comp Sci Beijing 100876 Peoples R China Stockholm Univ Dept Comp & Syst Sci S-16407 Stockholm Sweden
attribute-based encryption (ABE) has been used to provide data confidentiality and fine-grained access control in the Internet of Vehicles (IoV). However, the attributes of vehicles in IoV might change frequently due ... 详细信息
来源: 评论
attribute-based encryption for Access Control Using Elementary Operations  27
Attribute-based Encryption for Access Control Using Elementa...
收藏 引用
27th IEEE Computer Security Foundations Symposium (CSF)
作者: Crampton, Jason Pinto, Alexandre Royal Holloway Univ London Informat Secur Grp Egham Surrey England Inst Univ Maia Maia Portugal
attribute-based encryption (ABE) has attracted considerable attention in the research community in recent years. It has a number of applications such as broadcast encryption and the cryptographic enforcement of access... 详细信息
来源: 评论
attribute-based encryption with Break-Glass
Attribute-Based Encryption with Break-Glass
收藏 引用
4th International Workshop on Information Security Theory and Practice (WISTP 2010)
作者: Brucker, Achim D. Petritsch, Helmut Weber, Stefan G. SAP Res Vincenz Priessnitz Str 1 D-76131 Karlsruhe Germany Tech Univ Darmstadt Telecooperat Grp D-64289 Darmstadt Germany
attribute-based encryption (ABE) allows for implementing One-grained decentralized access control based on properties or attributes a user has. Thus, there is no need for writing detailed, user-based policies in advan... 详细信息
来源: 评论
attribute-based encryption with Personalized Search  15
Attribute-Based Encryption with Personalized Search
收藏 引用
15th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA) / 16th IEEE International Conference on Ubiquitous Computing and Communications (IUCC)
作者: Zhang, Qiang Wang, Guojun Liu, Qin Peng, Tao Cent South Univ Sch Informat Sci & Engn Changsha 410083 Hunan Peoples R China Guangzhou Univ Sch Comp Sci & Educ Software Guangzhou 510006 Guangdong Peoples R China Hunan Univ Coll Comp Sci & Elect Engn Changsha 410082 Hunan Peoples R China
With the development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. However most existing works follow the model of "one size fits all" over encrypt... 详细信息
来源: 评论
attribute-based encryption with Expressive and Authorized Keyword Search  22nd
Attribute-Based Encryption with Expressive and Authorized Ke...
收藏 引用
22nd Australasian Conference on Information Security and Privacy (ACISP)
作者: Cui, Hui Deng, Robert H. Liu, Joseph K. Li, Yingjiu Singapore Management Univ Sch Informat Syst Singapore Singapore Monash Univ Fac Informat Technol Melbourne Vic Australia
To protect data security and privacy in cloud storage systems, a common solution is to outsource data in encrypted forms so that the data will remain secure and private even if storage systems are compromised. The enc... 详细信息
来源: 评论
attribute-based encryption Scheme Supporting Tree-Access Structure on Ideal Lattices  4th
Attribute-Based Encryption Scheme Supporting Tree-Access Str...
收藏 引用
4th International Conference on Cloud Computing and Security (ICCCS)
作者: Yu, Jinxia Yang, Chaochao Tang, Yongli Yan, Xixi Henan Polytech Univ Coll Comp Sci & Technol Jiaozuo 454000 Henan Peoples R China
attribute-based encryption (ABE) has been an active research area in cryptography due to its attractive applications. But almost all ABE scheme are based on bilinear maps, which leave them vulnerable to quantum crypta... 详细信息
来源: 评论
attribute-based encryption Method for Data Privacy Security Protection  20th
Attribute-Based Encryption Method for Data Privacy Security ...
收藏 引用
20th International Conference on Intelligent Computing (ICIC)
作者: Li, Ziqian He, Yeshen Zhang, Yiying Li, Siwei Wang, Cong Zhang, Xiankun Tianjin Univ Sci & Technol Artificial Intelligence Inst Tianjin 300457 Peoples R China Shenzhen Guodian Technol Commun Co Shenzhen 518000 Guangdong Peoples R China Beijing Zhongdian Feihua Commun Co Beijing 100070 Peoples R China
Storing power data in a cloud environment is an important step in the digital transformation of the power industry. Power data must be protected by a strict protection mechanism. Ensure that it is protected from any u... 详细信息
来源: 评论
ABDKS:attribute-based encryption with dynamic keyword search in fog computing
收藏 引用
Frontiers of Computer Science 2021年 第5期15卷 187-195页
作者: Fei MENG Leixiao CHENG Mingqiang WANG School of Mathematics Shandong UniversityJinan 250100China Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationJinan 250100China School of Mathematical Sciences Fudan UniversityShanghai 200433China
attribute-based encryption with keyword search(ABKS)achieves both fine-grained access control and keyword ***,in the previous ABKS schemes,the search algorithm requires that each keyword to be identical between the ta... 详细信息
来源: 评论
Substring-searchable attribute-based encryption and its application for IoT devices
收藏 引用
Digital Communications and Networks 2021年 第2期7卷 277-283页
作者: Xi Sun Hao Wang Xiu Fu Hong Qin Mei Jiang Likun Xue Xiaochao Wei School of Information Science and Engineering Shandong Normal UniversityJinanChina Guangxi Key Laboratory of Cryptography and Information Security GuilinChina Shandong Provincial Hospital Jinan China
With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data lea... 详细信息
来源: 评论