咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=ciphertext-policy attribute-based encryption"
99 条 记 录,以下是11-20 订阅
排序:
An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2020年 第2期16卷 1-15页
作者: Li, Hao Deng, Lianbing Yang, Cheng Liu, Jianbo Da Hengqin Sci & Technol Dev Co Ltd Zhuhai Peoples R China Commun Univ China Beijing Peoples R China Commun Univ China Sch Informat & Commun Engn 1 DingFuZhuang East St Beijing 100024 Peoples R China
With the development of cloud computing, more and more video services are moving to the cloud. How to realize fine-grained access control of those data on cloud becomes an urgent problem. attribute-based encryption pr... 详细信息
来源: 评论
Anonymous Leakage-Resilient ciphertext-policy attribute-based encryption Supporting Direct Revocation  2nd
Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Base...
收藏 引用
2nd International Conference on Frontiers in Cyber Security (FCS)
作者: Gao, Xiaoxu Zhang, Leyou Hu, Gongcheng Xidian Univ Sch Math & Stat Xian 710126 Peoples R China
Leakage-resilient ciphertext-policy attribute-based encryption (LR-CP-ABE) is an important tool to achieve fine-grained access control of data and resist side-channel attacks. Privacy protection and user revocation ar... 详细信息
来源: 评论
Multi-Value-Independent ciphertext-policy attribute based encryption with Fast Keyword Search
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2020年 第6期13卷 1142-1151页
作者: Wang, Haijiang Dong, Xiaolei Cao, Zhenfu Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai 200062 Peoples R China
ABKS has drawn much attention from research and industry in recent years, an ABKS scheme is an encryption scheme that supports keyword search and access control. attribute-based encryption is a public key encryption t... 详细信息
来源: 评论
White-Box Traceable ciphertext-policy attribute-based encryption in Multi-Domain Environment
收藏 引用
IEEE ACCESS 2019年 7卷 128298-128312页
作者: Yan, Xixi He, Xu Yu, Jinxia Tang, Yongli Henan Polytech Univ Sch Comp Sci & Technol Jiaozuo 454003 Henan Peoples R China
In a ciphertext-policy attribute-based encryption (CP-ABE) system, the decryption keys are only related to attributes shared by multiple users and do not contain any identity information of their original holders. Hen... 详细信息
来源: 评论
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2019年 第4期15卷
作者: Yu, Gang Wang, Yongjuan Cao, Zhenfu Lin, Jian Wang, Xiangyu Informat Sci & Technol Inst State Key Lab Math Engn & Adv Comp Zhengzhou 450001 Henan Peoples R China Informat Sci & Technol Inst Henan Key Lab Network Cryptog Technol Zhengzhou 450001 Henan Peoples R China East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai 200062 Peoples R China
ciphertext-policy attribute-based encryption is a promising mechanism with fine-grained access control for cloud storage system. However, there is a long-lasting problem of key abuse that a user may share its decrypti... 详细信息
来源: 评论
ciphertext-policy attribute-based encryption for General Circuits from Bilinear Maps
收藏 引用
Wuhan University Journal of Natural Sciences 2017年 第2期22卷 171-177页
作者: HU Peng GAO Haiying School of Information Security Zhengzhou Information and Technology Institute Zhengzhou 450004 Henan China
In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficien... 详细信息
来源: 评论
Survey on Revocation in ciphertext-policy attribute-based encryption
收藏 引用
SENSORS 2019年 第7期19卷 1695.-1695.页
作者: Al-Dahhan, Ruqayah R. Shi, Qi Lee, Gyu Myoung Kifayat, Kashif Univ Anbar Coll Comp & Informat Technol Al Anbar 31001 Iraq Liverpool John Moores Univ Dept Comp Sci Byrom St Liverpool L3 3AF Merseyside England Air Univ Dept Comp Sci & Engn Islamabad 44000 Pakistan
Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers. In particular, ciphertext-policy... 详细信息
来源: 评论
Searchable ciphertext-policy attribute-based encryption with Multi-Keywords for Secure Cloud Storage  18
Searchable Ciphertext-Policy Attribute-Based Encryption with...
收藏 引用
International Conference on Computing and Pattern Recognition (ICCPR)
作者: Zhao, Zhiyuan Sun, Lei Li, Zuohui Liu, Ying Zhengzhou Informat Sci & Technol Inst 62 Sci AveHigh Tech Zone Zhengzhou Henan Peoples R China
Searchable encryption is one of the most important techniques for the sensitive data outsourced to cloud server, and has been widely used in cloud storage which brings huge convenience and saves bandwidth and computin... 详细信息
来源: 评论
A ciphertext-policy attribute-based encryption based on Multi-valued Decision Diagram  10th
A Ciphertext-Policy Attribute-Based Encryption Based on Mult...
收藏 引用
10th IFIP TC 12 International Conference on Intelligent Information Processing (IIP)
作者: Zhang, Shaowei Li, Long Chang, Liang Gu, Tianlong Liu, Huadong Guilin Univ Elect Technol Guangxi Key Lab Trusted Software Guilin 541004 Peoples R China
ciphertext-policy attribute-based encryption (CP-ABE) is a kind of asymmetric encryption which is widely used in cyber-physical system and Internet of Things. In CP-ABE, access structure is an important component affe... 详细信息
来源: 评论
A ciphertext-policy attribute-based encryption based on an Ordered Binary Decision Diagram
收藏 引用
IEEE ACCESS 2017年 5卷 1137-1145页
作者: Li, Long Gu, Tianlong Chang, Liang Xu, Zhoubo Liu, Yining Qian, Junyan Guilin Univ Elect Technol Sch Electromech Engn Guilin 541004 Peoples R China Guilin Univ Elect Technol Guangxi Expt Ctr Informat Sci Guilin 541004 Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Trusted Software Guilin 541004 Peoples R China
ciphertext-policy attribute-based encryption (CP- ABE) is widely used in many cyber physical systems and the Internet of things for guaranteeing information security. In order to improve the performance and efficiency... 详细信息
来源: 评论