咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=ciphertext-policy attribute-based encryption"
99 条 记 录,以下是1-10 订阅
排序:
Reversible Data Hiding Algorithm in Encrypted Images based on Adaptive Median Edge Detection and ciphertext-policy attribute-based encryption
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1123-1155页
作者: Zongbao Jiang Minqing Zhang Weina Dong Chao Jiang Fuqiang Di Key Laboratory of Network and Information Security of People’s Armed Police Chinese People’s Armed Police Force Engineering UniversityXi’an710086China
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... 详细信息
来源: 评论
An Efficient Pairing-Free ciphertext-policy attribute-based encryption Scheme for Internet of Things
收藏 引用
SENSORS 2024年 第21期24卷 6843页
作者: Guo, Chong Gong, Bei Waqas, Muhammad Alasmary, Hisham Tu, Shanshan Chen, Sheng Beijing Univ Technol Coll Comp Sci Beijing 100124 Peoples R China Univ Greenwich Fac Engn & Sci Sch Comp & Math Sci London SE10 9LS England Edith Cowan Univ Sch Engn Joondalup WA 6027 Australia King Khalid Univ Dept Comp Sci Abha 62529 Saudi Arabia Univ Southampton Sch Elect & Comp Sci Southampton SO17 1BJ England
The Internet of Things (IoT) is a heterogeneous network composed of numerous dynamically connected devices. While it brings convenience, the IoT also faces serious challenges in data security. ciphertext-policy attrib... 详细信息
来源: 评论
Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
收藏 引用
Science China(Information Sciences) 2023年 第7期66卷 130-146页
作者: Dilxat GHOPUR Jianfeng MA Xindi MA Yinbin MIAO Jialu HAO Tao JIANG School of Cyber Engineering Xidian University Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Xi'an Satellite Control Center
With the rapid deployment of storage services, secure and efficient user authorization and revocation data shared through the cloud have become a grand challenge hindering cloud data *** previous direct and indirect u... 详细信息
来源: 评论
TinyABE: Unrestricted ciphertext-policy attribute-based encryption for Embedded Devices and Low-Quality Networks  13th
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encr...
收藏 引用
13th International Conference on the Theory and Application of Cryptographic Techniques in Africa (AFRICACRYPT)
作者: Venema, Marloes Alpar, Greg Radboud Univ Nijmegen Nijmegen Netherlands Open Univ Netherlands Heerlen Netherlands
ciphertext-policy attribute-based encryption (CP-ABE) has attracted much interest from the practical community to enforce access control in distributed settings such as the Internet of Things (IoT). In such settings, ... 详细信息
来源: 评论
An Efficient ciphertext-policy attribute-based encryption Scheme with policy Update
收藏 引用
Computers, Materials & Continua 2020年 第5期63卷 1031-1041页
作者: Changji Wang Yuan Yuan School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Mathematics and Statistics Guangdong University of Foreign StudiesGuangzhou510006China
ciphertext-policy attribute-based encryption(CP-ABE)is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the ***,when applying CP-ABE to data outsourcin... 详细信息
来源: 评论
Efficient and Secure ciphertext-policy attribute-based encryption Without Pairing for Cloud-Assisted Smart Grid
收藏 引用
IEEE ACCESS 2020年 8卷 40704-40713页
作者: Wang, Yong Chen, Biwen Li, Lei Ma, Qiang Li, Huicong He, Debiao State Grid Shandong Elect Power Co Jinan 250001 Peoples R China Wuhan Univ Sch Comp Sci Wuhan 430072 Peoples R China Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Peoples R China
Cloud-assisted smart grid has been broadly deployed to improve the economics, efficiency, sustainability, and reliability of electricity services. The new revolution of technology will also bring new challenges to dat... 详细信息
来源: 评论
ciphertext-policy attribute-based delay encryption
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 2023年 第2期22卷 167-185页
作者: Chen, Lijiao Lv, Kewei Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing 100093 Peoples R China
Timed-release CP-ABE can provide fine-grained and timed-release access control while ensuring data confidentiality. Existing schemes usually rely on a trusted third-party called time server. This paper proposes a nove... 详细信息
来源: 评论
A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2020年 第3-4期75卷 103-119页
作者: de Oliveira, Marcela T. Bakas, Alexandros Frimpong, Eugene Groot, Adrien E. D. Marquering, Henk A. Michalas, Antonis Olabarriaga, Silvia D. Univ Amsterdam Amsterdam Univ Med Ctr Amsterdam Netherlands Tampere Univ Tampere Finland
In emergency care, fast and efficient treatment is vital. The availability of Electronic Medical Records (EMR) allows healthcare professionals to access a patient's data promptly, which facilitates the decision-ma... 详细信息
来源: 评论
BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2021年 第3期17卷
作者: Zuo, Yuting Kang, Zhaozhe Xu, Jian Chen, Zhide Fujian Normal Univ Cangshan Campus8 Shangsan Rd Fuzhou 350007 Fujian Peoples R China
It is the most important and challenging problem to share the data safely in cloud computing. Some so-called trusted third parties may also infringe users' data privacy. It is an urgent problem for data owners to ... 详细信息
来源: 评论
Comment on "Circuit ciphertext-policy attribute-based Hybrid encryption With Verifiable Delegation in Cloud Computing"
收藏 引用
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2021年 第2期32卷 392-393页
作者: Cao, Zhengjun Markowitch, Olivier Shanghai Univ Dept Math Shangda Rd 99 Shanghai 200444 Peoples R China Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Xitucheng Rd 10 Beijing Peoples R China Univ Libre Bruxelles Comp Sci Dept Blvd Triomphe CP 2121050 Brussels Belgium
The scheme [1] is flawed because: (1) its circuit access structure is confusingly described;(2) the cloud server cannot complete the related computations;(3) some users can conspire to generate new decryption keys, wi... 详细信息
来源: 评论