咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献
  • 9 篇 会议

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 17 篇 计算机科学与技术...
    • 9 篇 信息与通信工程
    • 5 篇 电气工程
    • 3 篇 软件工程
    • 2 篇 电子科学与技术(可...

主题

  • 18 篇 ciphertext polic...
  • 3 篇 cloud computing
  • 2 篇 data security
  • 2 篇 access control
  • 2 篇 data sharing
  • 2 篇 blockchain
  • 2 篇 cryptography
  • 1 篇 lwe
  • 1 篇 secure communica...
  • 1 篇 lattice-based cr...
  • 1 篇 large universe
  • 1 篇 data burst probl...
  • 1 篇 message passing
  • 1 篇 advanced meterin...
  • 1 篇 privacy protecti...
  • 1 篇 privacy and inte...
  • 1 篇 cloud-assisted s...
  • 1 篇 iomt
  • 1 篇 mobile cloud ass...
  • 1 篇 secure multi-par...

机构

  • 1 篇 univ oslo dept i...
  • 1 篇 newcastle univ s...
  • 1 篇 natl chung cheng...
  • 1 篇 guangdong key la...
  • 1 篇 cardiff univ sch...
  • 1 篇 univ roma la sap...
  • 1 篇 hunan univ coll ...
  • 1 篇 univ manchester ...
  • 1 篇 zurich univ appl...
  • 1 篇 shenzhen univ co...
  • 1 篇 univ putra malay...
  • 1 篇 hunan prov key l...
  • 1 篇 bogazici univ de...
  • 1 篇 singapore manage...
  • 1 篇 commun univ chin...
  • 1 篇 sun yat sen univ...
  • 1 篇 guilin univ elec...
  • 1 篇 cent china norma...
  • 1 篇 china telecom co...
  • 1 篇 henan univ fac e...

作者

  • 1 篇 alagoz fatih
  • 1 篇 di bingbing
  • 1 篇 li jinguo
  • 1 篇 huang jiwu
  • 1 篇 zhang ning
  • 1 篇 gu dawu
  • 1 篇 ghanbarafjeh mil...
  • 1 篇 hu gongcheng
  • 1 篇 mohamed mohamad ...
  • 1 篇 li yingjiu
  • 1 篇 wu tong
  • 1 篇 chen zehong
  • 1 篇 lei bo
  • 1 篇 gur gurkan
  • 1 篇 wei zhenyang
  • 1 篇 zhang leyou
  • 1 篇 petrioli chiara
  • 1 篇 rana omer
  • 1 篇 capossele angelo...
  • 1 篇 singh aparna

语言

  • 18 篇 英文
检索条件"主题词=ciphertext policy attribute-based encryption"
18 条 记 录,以下是1-10 订阅
排序:
ciphertext policy attribute-based encryption for Circuits from LWE Assumption  21st
Ciphertext Policy Attribute-Based Encryption for Circuits fr...
收藏 引用
21st International Conference on Information and Communications Security (ICICS)
作者: Wang, Geng Liu, Zhen Gu, Dawu Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai Peoples R China
attribute-based encryption (ABE) is a standard method for achieving access control using cryptography, and is related to many other powerful primitives such as functional encryption. While classical pairing based ABE ... 详细信息
来源: 评论
Cloud-based Secure Healthcare Framework by using Enhanced ciphertext policy attribute-based encryption Scheme
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2021年 第6期12卷 393-399页
作者: Satar, Siti Dhalila Mohd Mohamed, Mohamad Afendee Hussin, Masnida Hanapi, Zurina Mohd Univ Sultan Zainal Abidin Fac Informat & Comp Terengganu Malaysia Univ Putra Malaysia Fac Comp Sci & Informat Technol Seri Kembangan Selangor Malaysia
Cloud computing is an emerging technology that has been used to provide better healthcare services to the users because of its convenient and economical features. Noted that the healthcare services required fast and r... 详细信息
来源: 评论
ERSChain: Towards secure and flexible educational resource sharing using consortium blockchain and revocable ciphertext-policy attribute-based encryption
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2024年 第5期36卷 e7941-e7941页
作者: Zhao, Gang He, Hui Di, Bingbing Wu, Tong Cent China Normal Univ Fac Artificial Intelligence Educ Wuhan Peoples R China Henan Univ Fac Educ Kaifeng Peoples R China
Sharing high-quality educational resources has become an effective way to promote educational equity. The traditional educational resource sharing platforms using centralized storage architecture have security issues.... 详细信息
来源: 评论
Analysis of ciphertext policy Hidden attribute-based encryption and Its Improved Method  2nd
Analysis of Ciphertext Policy Hidden Attribute-Based Encrypt...
收藏 引用
2nd International Conference on Frontiers in Cyber Security (FCS)
作者: Hu, Gongcheng Zhang, Leyou Xidian Univ Sch Math & Stat Xian 710126 Peoples R China
With people paying more attention to personal privacy protection, how to achieve fine-grained access control of data while protecting users' privacy has become a hot research at present. A ciphertext policy Attrib... 详细信息
来源: 评论
ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2017年 第4期11卷 2292-2309页
作者: Chen, Zehong Zhang, Peng Zhang, Fangguo Huang, Jiwu Shenzhen Univ Coll Informat Engn Shenzhen 518060 Peoples R China Shenzhen Univ ATR Key Lab Natl Def Technol Shenzhen 518060 Peoples R China Sun Yat Sen Univ Sch Data & Comp Sci Guangzhou 510006 Guangdong Peoples R China Guangdong Key Lab Informat Secur Guangzhou 510006 Guangdong Peoples R China
ciphertext policy attribute-based encryption (CP-ABE) is a useful cryptographic technology for guaranteeing data confidentiality but also fine-grained access control. Typically, CP-ABE can be divided into two classes:... 详细信息
来源: 评论
FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2025年 第3-4期80卷 323-339页
作者: Singh, Aparna Rathee, Geetanjali Netaji Subhas Univ Technol Dept CSE New Delhi 110078 India
Given the adaptability and effectiveness of the smart health sector, it has gained much momentum in the last few years, particularly during the COVID-19 pandemic. However, the security and privacy of data sent through... 详细信息
来源: 评论
Design of a Sharing System based on Privacy-Preserving Personal Data  27
Design of a Sharing System based on Privacy-Preserving Perso...
收藏 引用
27th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
作者: Cao, Jianxiang Song, Xing Commun Univ China Sch Comp & Cyber Sci Beijing 100024 Peoples R China
In recent years, machine learning has been widely used to process large-scale data and train complex models. However, there are certain security risks in the construction process of machine learning models. Data train... 详细信息
来源: 评论
Secure and Efficient Rule Sharing for Collaborative Intrusion Detection: Leveraging CP-ABE and Blockchain Technology  6
Secure and Efficient Rule Sharing for Collaborative Intrusio...
收藏 引用
6th International Conference on Computer Communication and the Internet (ICCCI)
作者: Chen, Hong Ji Cheng, Bo-Chao Natl Chung Cheng Univ Dept Commun Engn Chiayi Taiwan Natl Chung Cheng Univ Dept Eletr Engn Chiayi Taiwan
An intrusion detection system (IDS) is a software program that identifies malicious activity or policy violations in order to improve cybersecurity. A single and solitary IDS suffers from a single point of failure and... 详细信息
来源: 评论
An enhanced traceable access control scheme based on multi-authority CP-ABE for cloud-assisted e-health system
收藏 引用
COMPUTER NETWORKS 2024年 254卷
作者: Liu, Xiao Wei, Zhenyang Li, Gaoxiang Chen, Jining Guangxi Univ Coll Comp & Elect Informat Nanning 530000 Peoples R China Guangxi Zhuang Autonomous Reg Informat Ctr Guangxi Key Lab Digital Infrastruct Nanning 530200 Peoples R China
Due to the inherent openness of the Internet of Things (IoT), e-health systems that utilize this technology on a broad scale are susceptible to network attacks. The propose black and white box traceable multi-authorit... 详细信息
来源: 评论
A Cross-Domain Data Security Sharing Approach for Edge Computing based on CP-ABE  23
A Cross-Domain Data Security Sharing Approach for Edge Compu...
收藏 引用
23rd Asia-Pacific Network Operations and Management Symposium (APNOMS)
作者: Li, Jiacong Lv, Hang Lei, Bo China Telecom Corp Ltd Res Inst Beijing Peoples R China
Cloud computing is a unified management and scheduling model of computing resources. To satisfy multiple resource requirements for various application, edge computing has been proposed. One challenge of edge computing... 详细信息
来源: 评论