咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"主题词=ciphertext-policy attribute-based encryption"
99 条 记 录,以下是31-40 订阅
Integrating ciphertext-policy attribute-based encryption with Identity-based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks  10
Integrating Ciphertext-Policy Attribute-Based Encryption wit...
收藏 引用
10th China International Conference on Information Security and Cryptology (Inscrypt)
作者: Wang, Changji Xu, Xilei Li, Yuan Shi, Dongyuan Yunnan Univ Natl Pilot Sch Software Kunming 650500 Peoples R China Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou 510275 Guangdong Peoples R China Sun Yat Sen Univ Guangdong Key Lab Informat Secur Technol Guangzhou 510275 Guangdong Peoples R China
The technology of wireless body area network (WBAN) has attracted intensive attention in recent years. For widespread deployment of WBANs, security and privacy issues must be addressed properly. Recently, Hu et al. pr... 详细信息
来源: 评论
A Threshold-based Key Generation Approach for ciphertext-policy attribute-based encryption  7
A Threshold-based Key Generation Approach for Ciphertext-Pol...
收藏 引用
International Conference on Ubiquitous and Future Networks
作者: Huang, Win-Bin Su, Wei-Tsung Liang, Chiang-Sheng Peking Univ Dept Informat Management Beijing Peoples R China Aletheia Univ Dept Comp Sci & Informat Engn New Taipei Taiwan
ciphertext-policy attribute-based encryption (CP-ABE) is proposed to provide identity-based access control which is suitable for cloud storage services. In CP-ABE, because the authority is responsible for key manageme... 详细信息
来源: 评论
Optimized ciphertext-policy attribute-based encryption with Efficient Revocation
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2013年 第6期7卷 385-394页
作者: Li, Yang Zhu, Jianming Wang, Xiuli Chai, Yanmei Shao, Shuai Cent Univ Finance & Econ Coll Informat Beijing 100081 Peoples R China China Informat Technol Secur Evaluat Ctr Beijing 100085 Peoples R China
In this work, we design a method for efficient revocation within ciphertext-policy attribute-based encryption scheme. Our main technical innovation is based on linear secret sharing and binary tree techniques, every u... 详细信息
来源: 评论
An Access Control Scheme With Privacy-Preserving Authentication and Flexible Revocation for Smart Healthcare
收藏 引用
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS 2024年 第6期28卷 3269-3278页
作者: Liang, Xiyu Liu, Yali Ning, Jianting Jiangsu Normal Univ Coll Comp Sci & Technol Xuzhou 221116 Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Cryptog & Informat Secur Guilin 541004 Peoples R China Fujian Normal Univ Coll Comp & Cyber Secur Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Peoples R China Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China
IoT and 5G-enabled smart healthcare allows medical practitioners to diagnose patients from any location via electronic health records (EHRs) by wireless body area network (WBAN) devices. Privacy, including the medical... 详细信息
来源: 评论
Designing quantum-secure attribute-based encryption
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2024年 第9期27卷 13075-13091页
作者: Rao, Y. Sreenivasa Srivastava, Vikas Mohanty, Tapaswini Debnath, Sumit Kumar Natl Inst Technol Warangal Dept Math Warangal Telangana India Natl Inst Technol Jamshedpur Dept Math Jamshedpur Jharkhand India
In the last couple of decades, attribute-based encryption (ABE) has been a promising encryption technique to realize fine-grained access control over encrypted data. ABE has appealing functionalities such as (i) acces... 详细信息
来源: 评论
CBDDS: Secure and Revocable Cache-based Distributed Data Sharing for Vehicular Networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2024年 第6期23卷 6579-6591页
作者: Zhang, Jing Liu, Xinzhong Cui, Jie Zhong, Hong Wei, Lu Bolodurina, Irina He, Debiao Anhui Univ Sch Comp Sci & Technol Key Lab Intelligent Comp & Signal Proc Minist Educ Hefei 230039 Peoples R China Anhui Univ Anhui Engn Lab IoT Secur Technol Hefei 230039 Peoples R China Orenburg State Univ Fac Math & Informat Technol Orenburg 460018 Russia Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Hubei Peoples R China Shanghai Key Lab Privacy Preserving Computat MatrixElements Technol Shanghai 201204 Peoples R China
In vehicular networks, caching content on an edge server (ES) is a popular method for quickly responding to massive vehicle service requests, reducing communication delays, and enhancing driver and passenger service e... 详细信息
来源: 评论
Flexible and Efficient Multi-Authorization Data Sharing Scheme With Enhanced Privacy Protection
收藏 引用
INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES 2025年 第1期21卷
作者: Zhong, Chen Yue, Qiuling Hainan Univ Sch Cyberspace Secur Sch Cryptol Haikou Peoples R China
The advancement of the digital economy relies on secure data sharing. However, most existing methods face challenges like single-points-of-failure, insufficient privacy protection, and low efficiency. To address these... 详细信息
来源: 评论
A lattice-based CP-ABE scheme with immediate attribute revocation
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 2025年 第1-2期26卷 41-67页
作者: He, Miao Helil, Nurmamat Xinjiang Univ Coll Math & Syst Sci Xinjiang Peoples R China
ciphertext-policy attribute-based encryption (CP-ABE) is suitable for providing secure data-sharing services in the cloud storage scenario. However, attribute revocation in CP-ABE is a sticky issue. The research achie... 详细信息
来源: 评论
Partial policy hidden medical data access control method based on CP-ABE
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 1-12页
作者: Huang, Jing Tang, Detao Jiang, Chenyu Chen, Fulong Zhang, Ji Xie, Dong Wang, Taochun Zhao, Chuanxin Wang, Chao Li, Jintao Anhui Normal University Anhui Wuhu241000 China Anhui Vocational Colledge of Defense Technology Anhui Liuan237000 China University of Southern Queensland ToowoombaQLD4350 Australia
The secure sharing and privacy protection of medical data are of great significance during the development of smart medical care. In order to achieve data sharing among medical institutions, ciphertext-policy attribut... 详细信息
来源: 评论
Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2023年 第2期20卷 1745-1758页
作者: Liu, Suhui Yu, Jiguo Chen, Liquan Chai, Baobao Southeast Univ Sch Cyber Sci & Engn Nanjing 211102 Peoples R China Qilu Univ Technol Big Data Inst Jinan 250353 Peoples R China Qilu Univ Technol Shandong Fundamental Res Ctr Comp Sci Jinan 250353 Shandong Peoples R China Shandong Univ Sci & Technol Sch Comp Sci & Engn Qingdao 266590 Peoples R China
Public clouds have drawn increasing attention from academia and industry due to their high computational and storage performance. attribute-based encryption (ABE) is the most promising technology to simultaneously ach... 详细信息
来源: 评论