咨询与建议

限定检索结果

文献类型

  • 651 篇 期刊文献
  • 390 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 1,044 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,012 篇 工学
    • 889 篇 计算机科学与技术...
    • 381 篇 电气工程
    • 300 篇 信息与通信工程
    • 182 篇 软件工程
    • 55 篇 电子科学与技术(可...
    • 51 篇 网络空间安全
    • 32 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 6 篇 机械工程
    • 6 篇 土木工程
    • 5 篇 石油与天然气工程
    • 3 篇 测绘科学与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 环境科学与工程(可...
  • 94 篇 理学
    • 57 篇 数学
    • 31 篇 化学
    • 27 篇 生物学
    • 6 篇 系统科学
    • 3 篇 统计学(可授理学、...
  • 50 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
    • 3 篇 公共管理
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 法学
  • 3 篇 教育学
    • 3 篇 心理学(可授教育学...
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 1,044 篇 attribute-based ...
  • 256 篇 access control
  • 178 篇 cloud computing
  • 100 篇 blockchain
  • 73 篇 security
  • 73 篇 encryption
  • 64 篇 multi-authority
  • 60 篇 data sharing
  • 51 篇 privacy
  • 50 篇 revocation
  • 50 篇 searchable encry...
  • 49 篇 cloud storage
  • 47 篇 internet of thin...
  • 41 篇 cryptography
  • 36 篇 proxy re-encrypt...
  • 33 篇 ciphertext-polic...
  • 32 篇 fine-grained acc...
  • 32 篇 outsourced decry...
  • 28 篇 servers
  • 27 篇 fog computing

机构

  • 27 篇 xian univ posts ...
  • 24 篇 xidian univ sch ...
  • 22 篇 xidian univ stat...
  • 20 篇 state key lab cr...
  • 19 篇 chinese acad sci...
  • 17 篇 westone cryptol ...
  • 15 篇 xidian univ stat...
  • 15 篇 xidian univ sch ...
  • 13 篇 univ elect sci &...
  • 12 篇 singapore manage...
  • 11 篇 shanghai jiao to...
  • 11 篇 guangzhou univ s...
  • 11 篇 beijing univ pos...
  • 11 篇 beijing univ pos...
  • 9 篇 hohai univ coll ...
  • 9 篇 fuzhou univ coll...
  • 9 篇 univ elect sci &...
  • 9 篇 natl inst adv in...
  • 8 篇 guangzhou univ s...
  • 7 篇 xian univ techno...

作者

  • 26 篇 susilo willy
  • 24 篇 zhang yinghui
  • 19 篇 zheng dong
  • 19 篇 huang qinlong
  • 17 篇 mu yi
  • 17 篇 yang yixian
  • 17 篇 liu ximeng
  • 15 篇 li hui
  • 14 篇 deng robert h.
  • 14 篇 ning jianting
  • 13 篇 li jin
  • 13 篇 zhang leyou
  • 13 篇 chen xiaofeng
  • 12 篇 cao zhenfu
  • 12 篇 attrapadung nutt...
  • 11 篇 wang guojun
  • 11 篇 liang kaitai
  • 11 篇 zhang rui
  • 11 篇 liu zhenhua
  • 11 篇 li jiguo

语言

  • 1,024 篇 英文
  • 13 篇 其他
  • 8 篇 中文
检索条件"主题词=attribute-based encryption"
1044 条 记 录,以下是71-80 订阅
排序:
A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2016年 第17期9卷 4138-4150页
作者: Wang, Qihua Yu, Chang Wu Li, Fagen Wang, Huaqun Cao, Lijie Dalian Ocean Univ Dept Informat Engn Dalian 116023 Peoples R China Univ Elect Sci & Technol China Sch Comp Sci & Engn Chengdu 611731 Peoples R China Chung Hua Univ Dept Comp Sci & Informat Engn Hsinchu 300 Taiwan Nanjing Univ Posts & Telecommun Coll Comp Nanjing 210003 Jiangsu Peoples R China
Outsourcing decryption that enables the authorized users to obtain the original data without decryption computation is crucially important for wireless sensor networks in public data center. The existing outsourcing d... 详细信息
来源: 评论
Generic and Efficient Constructions of attribute-based encryption with Verifiable Outsourced Decryption
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2016年 第5期13卷 533-546页
作者: Mao, Xianping Lai, Junzuo Mei, Qixiang Chen, Kefei Weng, Jian Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China Jinan Univ Dept Comp Sci Guangzhou 510632 Guangdong Peoples R China Guangdong Ocean Univ Coll Informat Zhanjiang 524088 Peoples R China Hangzhou Normal Univ Sch Sci Hangzhou 310036 Zhejiang Peoples R China
attribute-based encryption (ABE) provides a mechanism for complex access control over encrypted data. However in most ABE systems, the ciphertext size and the decryption overhead, which grow with the complexity of the... 详细信息
来源: 评论
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2015年 第6期14卷 487-497页
作者: Qian, Huiling Li, Jiguo Zhang, Yichen Han, Jinguang Hohai Univ Coll Comp & Informat Nanjing 211100 Jiangsu Peoples R China Nanjing Univ Finance & Econ Jiangsu Prov Key Lab E Business Nanjing 210003 Jiangsu Peoples R China
Personal health record (PHR) service is an emerging model for health information exchange. In PHR systems, patient's health records and information are maintained by the patient himself through the Web. In reality... 详细信息
来源: 评论
Efficient Revocable Multi-Authority attribute-based encryption for Cloud Storage
收藏 引用
IEEE ACCESS 2021年 9卷 42593-42603页
作者: Ming, Yang He, Baokang Wang, Chenhao Changan Univ Sch Informat Engn Xian 710064 Peoples R China
As is known, attribute-based encryption (ABE) is usually adopted for cloud storage, both for its achievement of fine-grained access control over data, and for its guarantee of data confidentiality. Nevertheless, singl... 详细信息
来源: 评论
Server-aided revocable attribute-based encryption for cloud computing services
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2020年 第14期32卷 e5680-e5680页
作者: Cui, Hui Yuen, Tsz Hon Deng, Robert H. Wang, Guilin Murdoch Univ Discipline Informat Technol Math & Stat Perth WA Australia Univ Hong Kong Dept Comp Sci Hong Kong Peoples R China Singapore Management Univ Singapore Singapore Huawei Int Pte Ltd Singapore Singapore
attribute-based encryption (ABE) has been regarded as a promising solution in cloud computing services to enable scalable access control without compromising the security. Despite of the advantages, efficient user rev... 详细信息
来源: 评论
Secure Federated Cloud Storage Protection Strategy Using Hybrid Heuristic attribute-based encryption With Permissioned Blockchain
收藏 引用
IEEE ACCESS 2024年 12卷 117154-117169页
作者: Kathole, Atul B. Vhatkar, Kapil Netaji Goyal, Ankur Kaushik, Shivkant Mirge, Amita Sanjiv Jain, Prince Soliman, Mohamed S. Islam, Mohammad Tariqul Dr DY Patil Inst Technol Dept Comp Engn Pune 411018 India Symbiosis Int Symbiosis Inst Technol Dept Comp Sci & Engn Pune 412115 Maharashtra India Greater Noida Inst Technol GNIOT Dept Comp Sci & Engn AI & DS Greater Noida 201310 Uttar Pradesh India Pimpri Chinchwad Coll Engn Dept IT Pune 411044 Maharashtra India Parul Univ Parul Inst Technol Dept Mechatron Engn Vadodara 391760 Gujarat India Taif Univ Coll Engn Dept Elect Engn Taif 21944 Saudi Arabia UKM Fac Engn & Built Environm Dept Elect Elect & Syst Engn Bangi 43600 Selangor Malaysia
The rapid growth of the Internet of Medical Things (IoMT) has introduced significant security and privacy challenges in managing and protecting medical data. This paper proposes a secure federated cloud storage system... 详细信息
来源: 评论
Fast, compact, and expressive attribute-based encryption
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2021年 第11期89卷 2577-2626页
作者: Tomida, Junichi Kawahara, Yuto Nishimaki, Ryo NTT Secure Platform Labs Tokyo Japan
attribute-based encryption (ABE) is an advanced cryptographic tool and useful to build various types of access control systems. Toward the goal of making ABE more practical, we propose key-policy (KP) and ciphertext-p... 详细信息
来源: 评论
Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2024年 第8期27卷 10437-10453页
作者: Zhao, Xiaolong Huang, Zhenjie Minnan Normal Univ Fujian Key Lab Granular Comp & Applicat Zhangzhou 363000 Fujian Peoples R China Minnan Normal Univ Sch Math & Stat Zhangzhou 363000 Fujian Peoples R China
Verifiable outsourced attribute-based encryption (VO-ABE) enables one-to-many data sharing and fine-grained access control under lower trust, making it suitable for cloud or edge systems involving resource-constrained... 详细信息
来源: 评论
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2020年 第11期11卷 4613-4641页
作者: Pournaghi, Seyed Morteza Bayat, Majid Farjami, Yaghoub Univ Qom Dept Comp Engn Qom Iran Shahed Univ Dept Comp Engn Tehran Iran
The development of Electronic Information Technology has made the Electronic Medical Record a commonly used approach to recording and categorizing medical patient data in databases of different hospitals and medical e... 详细信息
来源: 评论
ON THE FEASIBILITY OF attribute-based encryption ON INTERNET OF THINGS DEVICES
收藏 引用
IEEE MICRO 2016年 第6期36卷 25-35页
作者: Ambrosin, Moreno Anzanpour, Arman Conti, Mauro Dargahi, Tooska Moosavi, Sanaz Rahimi Rahmani, Amir M. Liljeberg, Pasi Univ Padua Comp Sci I-35100 Padua Italy Univ Turku IoT Hlth Grp SF-20500 Turku Finland Univ Padua Dept Math I-35100 Padua Italy CNIT Parma Italy Univ Turku Dept Informat Technol SF-20500 Turku Finland Univ Turku Embedded Parallel & Distributed Comp SF-20500 Turku Finland Univ Turku Embedded Comp Architectures SF-20500 Turku Finland
attribute-based encryption (abe) could be an effective cryptographic tool for the secure management of internet of things (iot) devices, but its feasibility in the iot has been under-investigated thus far. This articl... 详细信息
来源: 评论