咨询与建议

限定检索结果

文献类型

  • 58 篇 期刊文献
  • 40 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 79 篇 计算机科学与技术...
    • 29 篇 电气工程
    • 26 篇 信息与通信工程
    • 20 篇 软件工程
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 9 篇 理学
    • 4 篇 数学
    • 4 篇 化学
    • 3 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 99 篇 ciphertext-polic...
  • 22 篇 cloud computing
  • 20 篇 access control
  • 8 篇 searchable encry...
  • 8 篇 cloud storage
  • 7 篇 security
  • 7 篇 encryption
  • 6 篇 blockchain
  • 6 篇 attribute revoca...
  • 5 篇 user revocation
  • 4 篇 access structure
  • 4 篇 cp-abe
  • 4 篇 servers
  • 3 篇 data security
  • 3 篇 data sharing
  • 3 篇 collusion-resist...
  • 3 篇 keyword search
  • 3 篇 wireless sensor ...
  • 3 篇 policy hiding
  • 3 篇 attribute-based ...

机构

  • 5 篇 east china norma...
  • 5 篇 singapore manage...
  • 4 篇 univ texas san a...
  • 4 篇 sun yat sen univ...
  • 3 篇 beihang univ sch...
  • 3 篇 shanghai jiao to...
  • 3 篇 beihang univ bei...
  • 3 篇 yunnan univ natl...
  • 3 篇 fuzhou univ coll...
  • 2 篇 beihang univ eco...
  • 2 篇 chinese acad sci...
  • 2 篇 int inst informa...
  • 2 篇 aletheia univ de...
  • 2 篇 shenzhen univ co...
  • 2 篇 minist educ key ...
  • 2 篇 zhengzhou inform...
  • 2 篇 southeast univ s...
  • 2 篇 guilin univ elec...
  • 2 篇 singapore manage...
  • 2 篇 china univ geosc...

作者

  • 5 篇 choo kim-kwang r...
  • 5 篇 cao zhenfu
  • 5 篇 liu ximeng
  • 4 篇 dong xiaolei
  • 4 篇 deng robert h.
  • 3 篇 chen chen
  • 3 篇 zhao zhiyuan
  • 3 篇 yao wang
  • 3 篇 zhang xiao
  • 3 篇 ning jianting
  • 3 篇 wu faguo
  • 3 篇 wang changji
  • 3 篇 chen wei
  • 3 篇 shi jiaoli
  • 2 篇 wang jing
  • 2 篇 ma jianfeng
  • 2 篇 huang win-bin
  • 2 篇 das ashok kumar
  • 2 篇 liang kaitai
  • 2 篇 wang haijiang

语言

  • 94 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=ciphertext-policy attribute-based encryption"
99 条 记 录,以下是51-60 订阅
排序:
A Lightweight Cloud Sharing PHR System with Access policy Updating
收藏 引用
IEEE ACCESS 2018年 6卷 64611-64621页
作者: Ying, Zuobin Jang, Wenjie Cao, Shuanglong Liu, Ximeng Cui, Jie Anhui Univ Sch Comp Sci & Technol Hefei 230601 Anhui Peoples R China Fuzhou Univ Coll Math & Comp Sci Fuzhou 350108 Fujian Peoples R China Singapore Management Univ Sch Informat Syst Singapore 178902 Singapore
The rapid development of smart wearable devices makes personal health management feasible, which also stimulates the evolution of personal health records (PHRs). However, PHRs face many security challenges ever since ... 详细信息
来源: 评论
Privacy-Preserving attribute-based Keyword Search in Shared Multi-owner Setting
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2021年 第3期18卷 1080-1094页
作者: Miao, Yinbin Liu, Ximeng Choo, Kim-Kwang Raymond Deng, Robert H. Li, Jiguo Li, Hongwei Ma, Jianfeng Xidian Univ Dept Cyber Engn Xian 710071 Peoples R China State Key Lab Cryptol POBox 5159 Beijing 100878 Peoples R China Fuzhou Univ Coll Math & Comp Sci Fuzhou 350117 Peoples R China Fujian Prov Key Lab Informat Secur Network Syst Fuzhou 350117 Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA Singapore Management Univ Dept Informat Syst 80 Stamford Rd Singapore Singapore Fujian Normal Univ Coll Math & Informat Fuzhou 350117 Peoples R China Univ Elect Sci & Technol China Dept Comp Sci & Engn Chengdu 610051 Peoples R China
ciphertext-policy attribute-based Keyword Search (CP-ABKS) facilitates search queries and supports fine-grained access control over encrypted data in the cloud. However, prior CP-ABKS schemes were designed to support ... 详细信息
来源: 评论
CBDDS: Secure and Revocable Cache-based Distributed Data Sharing for Vehicular Networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2024年 第6期23卷 6579-6591页
作者: Zhang, Jing Liu, Xinzhong Cui, Jie Zhong, Hong Wei, Lu Bolodurina, Irina He, Debiao Anhui Univ Sch Comp Sci & Technol Key Lab Intelligent Comp & Signal Proc Minist Educ Hefei 230039 Peoples R China Anhui Univ Anhui Engn Lab IoT Secur Technol Hefei 230039 Peoples R China Orenburg State Univ Fac Math & Informat Technol Orenburg 460018 Russia Wuhan Univ Sch Cyber Sci & Engn Wuhan 430072 Hubei Peoples R China Shanghai Key Lab Privacy Preserving Computat MatrixElements Technol Shanghai 201204 Peoples R China
In vehicular networks, caching content on an edge server (ES) is a popular method for quickly responding to massive vehicle service requests, reducing communication delays, and enhancing driver and passenger service e... 详细信息
来源: 评论
Blockchain-Assisted Collaborative Service Recommendation Scheme With Data Sharing
收藏 引用
IEEE ACCESS 2021年 9卷 40871-40883页
作者: Yan, Biwei Dong, Anming Chai, Baobao Han, Yubing Zhou, Guanglin Zhao, Fangxin Qufu Normal Univ Sch Math Sci Qufu 273165 Shandong Peoples R China Qilu Univ Technol Shandong Acad Sci Sch Comp Sci & Technol Jinan 250353 Peoples R China
With the rapid development of cloud computing, a large number of web services have been emerging quickly, which brings a heavy burden for users to choose the services they preferred. In order to suggest web services f... 详细信息
来源: 评论
Reliable policy Updating Under Efficient policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2022年 第6期15卷 3485-3498页
作者: Ying, Zuobin Jiang, Wenjie Liu, Ximeng Xu, Shengmin Deng, Robert H. City Univ Macau Inst Data Sci Macau 999078 Peoples R China Anhui Univ Sch Comp Sci & Technol Hefei 230601 Peoples R China Fuzhou Univ Sch Math & Comp Sci Fujian Prov Key Lab Informat Secur Network Syst Fuzhou 350117 Peoples R China Singapore Management Univ Sch Informat Syst Singapore 188065 Singapore Singapore Management Univ Secure Mobile Ctr Sch Informat Syst Singapore 178902 Singapore
ciphertext-policy attribute-based encryption (CP-ABE) is one of the potent encryption paradigms in protecting data confidentiality in the cloud data sharing scenario. However, the access policy of the traditional CP-A... 详细信息
来源: 评论
Security-Aware Information Dissemination With Fine-Grained Access Control in Cooperative Multi-RSU of VANETs
收藏 引用
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2022年 第3期23卷 2170-2179页
作者: Liu, Xuejiao Chen, Wei Xia, Yingjie Hangzhou Normal Univ Sch Informat Sci & Engn Hangzhou 311121 Peoples R China Zhejiang Univ Coll Comp Sci Hangzhou 310027 Peoples R China Hangzhou Yuantiao Technol Co Hangzhou 310000 Peoples R China
Securing information dissemination is extremely important for various vehicular ad hoc networks (VANETs) applications. However, most of the applications require disseminating the critical information only to the autho... 详细信息
来源: 评论
An access control scheme with dynamic user management and cloud-aided decryption
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2016年 第18期9卷 5659-5672页
作者: Shi, Jiaoli Huang, Chuanhe Wang, Jing He, Kai Shen, Xieyang Wuhan Univ Comp Sch Wuhan Peoples R China Collaborat Innovat Ctr Geospatial Technol Wuhan Peoples R China Jiujiang Univ Jiujiang Peoples R China
ciphertext-policy attribute-based encryption is becoming a cryptographic solution to realize fine-grained access control. However, some important problems have not been effectively solved yet such as (i) low efficienc... 详细信息
来源: 评论
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2018年 第5期15卷 883-897页
作者: Ning, Jianting Cao, Zhenfu Dong, Xiaolei Wei, Lifei Shanghai Jiao Tong Univ Dept Comp Sci & Engn Shanghai 200240 Peoples R China East China Normal Univ Shanghai Key Lab Trustworthy Comp Shanghai 200062 Peoples R China Shanghai Ocean Univ Coll Informat Technol Shanghai 201306 Peoples R China
ciphertext-policy attribute-based encryption (CP-ABE) has been proposed to enable fine-grained access control on encrypted data for cloud storage service. In the context of CP-ABE, since the decryption privilege is sh... 详细信息
来源: 评论
Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model
收藏 引用
COMPUTER JOURNAL 2021年 第4期64卷 509-533页
作者: Li, Cong Shen, Qingni Xie, Zhikang Feng, Xinyu Fang, Yuejian Wu, Zhonghai Peking Univ Sch Software & Microelect Beijing 102600 Peoples R China Peking Univ Natl Engn Res Ctr Software Engn Beijing 100871 Peoples R China
attribute-based encryption with equality test (ABEET) simultaneously supports fine-grained access control on the encrypted data and plaintext message equality comparison without decrypting the ciphertexts. Recently, t... 详细信息
来源: 评论
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
收藏 引用
COMPUTER STANDARDS & INTERFACES 2017年 第Part1期54卷 3-9页
作者: Odelu, Vanga Das, Ashok Kumar Rao, Y. Sreenivasa Kumari, Saru Khan, Muhammad Khurram Choo, Kim-Kwang Raymond Indian Inst Technol Dept Math Kharagpur 721302 W Bengal India Int Inst Informat Technol Ctr Secur Theory & Algorithm Res Hyderabad 500032 Andhra Pradesh India Ch Charan Singh Univ Dept Math Meerut 250005 Uttar Pradesh India King Saud Univ Ctr Excellence Informat Assurance Riyadh 11451 Saudi Arabia China Univ Geosci Sch Comp Sci Wuhan 430074 Peoples R China Univ South Australia Sch Informat Technol & Math Sci Adelaide SA 5001 Australia Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA
ciphertext-policy attribute-based encryption (CP-ABE) scheme can be deployed in a mobile cloud environment to ensure that data outsourced to the cloud will be protected from unauthorized access. Since mobile devices a... 详细信息
来源: 评论