咨询与建议

限定检索结果

文献类型

  • 26 篇 期刊文献
  • 8 篇 会议

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 31 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 10 篇 软件工程
    • 9 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
  • 2 篇 理学
    • 2 篇 生物学
    • 1 篇 化学

主题

  • 34 篇 conditional prox...
  • 8 篇 chosen-ciphertex...
  • 6 篇 proxy re-encrypt...
  • 6 篇 cloud computing
  • 5 篇 attribute-based ...
  • 3 篇 internet of thin...
  • 3 篇 data sharing
  • 3 篇 identity-based p...
  • 2 篇 data security
  • 2 篇 without random o...
  • 2 篇 keyword search
  • 2 篇 chosen-ciphertex...
  • 2 篇 identity-based
  • 2 篇 receivers
  • 2 篇 blockchain
  • 2 篇 protocols
  • 2 篇 encryption
  • 2 篇 user revocation
  • 1 篇 emr sharing
  • 1 篇 secret sharing

机构

  • 7 篇 nanjing univ aer...
  • 4 篇 jinan univ dept ...
  • 3 篇 singapore manage...
  • 3 篇 beijing univ pos...
  • 3 篇 beijing univ pos...
  • 2 篇 jiangsu univ tec...
  • 2 篇 univ wollongong ...
  • 1 篇 kennesaw state u...
  • 1 篇 nanjing univ aer...
  • 1 篇 inst infocomm re...
  • 1 篇 natl univ def te...
  • 1 篇 astri secur & da...
  • 1 篇 innopolis univ i...
  • 1 篇 zhejiang gongsha...
  • 1 篇 university of so...
  • 1 篇 nit warangal dep...
  • 1 篇 hanyang univ dep...
  • 1 篇 yangzhou univ de...
  • 1 篇 east china norma...
  • 1 篇 jinan univ coll ...

作者

  • 7 篇 ge chunpeng
  • 6 篇 fang liming
  • 5 篇 weng jian
  • 5 篇 wang jiandong
  • 5 篇 susilo willy
  • 4 篇 yang yixian
  • 4 篇 huang qinlong
  • 3 篇 deng robert h.
  • 2 篇 kim donghyun
  • 2 篇 liang kaitai
  • 2 篇 fu jingyi
  • 2 篇 yue wei
  • 2 篇 ren yongjun
  • 2 篇 wong duncan s.
  • 2 篇 choo kim-kwang r...
  • 2 篇 yang yanjiang
  • 2 篇 chu cheng-kang
  • 2 篇 oh heekuck
  • 2 篇 liu joseph k.
  • 2 篇 hussain rasheed

语言

  • 33 篇 英文
  • 1 篇 其他
检索条件"主题词=conditional proxy re-encryption"
34 条 记 录,以下是21-30 订阅
排序:
A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment
收藏 引用
CONCURreNCY AND COMPUTATION-PRACTICE & EXPERIENCE 2017年 第14期29卷 e3946.1-e3946.16页
作者: Son, Junggab Kim, Donghyun Bhuiyan, Md Zakirul Alam Hussain, Rasheed Oh, Heekuck Kennesaw State Univ Dept Comp Sci Marietta GA 30060 USA Fordham Univ Dept Comp & Informat Sci Bronx NY 10458 USA Innopolis Univ Inst Informat Sci Innopolis Russia Hanyang Univ Dept Comp Sci & Engn Ansan South Korea
The mobile cloud is a highly heterogenous and constantly evolving network of numerous portable devices utilizing the powerful back-end cloud infrastructure to overcome their severe deficiency in computing resource and... 详细信息
来源: 评论
conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing
收藏 引用
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS 2019年 第2期11卷 115-124页
作者: Sun, Maosheng Ge, Chunpeng Fang, Liming Wang, Jiandong Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing Jiangsu Peoples R China Yangzhou Univ Dept Informat Ctr Yangzhou Jiangsu Peoples R China Jiangsu Univ Technol Dept Comp Engn Changzhou Peoples R China
conditional proxy broadcast re-encryption (CPBre) enables a semi-trusted proxy to convert Alice's ciphertext satisfying a certain condition into a set of users' ciphertext. The proxy, however, cannot learn any... 详细信息
来源: 评论
conditional proxy Broadcast re-encryption
Conditional Proxy Broadcast Re-Encryption
收藏 引用
14th Australasian Conference on Information Security and Privacy
作者: Chu, Cheng-Kang Weng, Jian Chow, Sherman S. M. Zhou, Jianying Deng, Robert H. Singapore Management Univ Sch Informat Syst Singapore Singapore
A proxy re-encryption (Pre) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts decryptable by the delegatee. Pre is useful in various applications such as encrypted email forwar... 详细信息
来源: 评论
Secure Data Group Sharing and conditional Dissemination with Multi-Owner in Cloud Computing
收藏 引用
IEEE TRANSACTIONS ON CLOUD COMPUTING 2021年 第4期9卷 1607-1618页
作者: Huang, Qinlong Yang, Yixian Yue, Wei He, Yue Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Natl Engn Lab Disaster Backup & Recovery Beijing 100876 Peoples R China
With the rapid development of cloud services, huge volume of data is shared via cloud computing. Although cryptographic techniques have been utilized to provide data confidentiality in cloud computing, current mechani... 详细信息
来源: 评论
Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
收藏 引用
IEEE ACCESS 2018年 6卷 36584-36594页
作者: Huang, Qinlong Yue, Wei He, Yue Yang, Yixian Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China
Cloud computing and social networks are changing the way of healthcare by providing real-time data sharing in a cost-effective manner. However, data security issue is one of the main obstacles to the wide application ... 详细信息
来源: 评论
Cloud based data sharing with fine-grained proxy re-encryption
收藏 引用
PERVASIVE AND MOBILE COMPUTING 2016年 28卷 122-134页
作者: Yang, Yanjiang Zhu, Haiyan Lu, Haibing Weng, Jian Zhang, Youcheng Choo, Kim-Kwang Raymond Inst Infocomm Res Singapore Singapore Beihang Univ Sch Elect & Informat Engn Beijing 100191 Peoples R China Santa Clara Univ Leavey Sch Business Santa Clara CA 95053 USA Jinan Univ Dept Comp Sci Jinan Peoples R China Nanjing Unary Informat Technol Co Ltd Nanjing Jiangsu Peoples R China Univ S Australia Informat Assurance Res Lab Adelaide SA 5001 Australia
conditional proxy re-encryption (CPre) enables fine-grained delegation of decryption rights, and has many real-world applications. In this paper, we present a ciphertext-policy attribute based CPre scheme, together wi... 详细信息
来源: 评论
A Key-Policy Attribute-Based proxy re-encryption Without Random Oracles
收藏 引用
COMPUTER JOURNAL 2016年 第7期59卷 970-982页
作者: Ge, Chunpeng Susilo, Willy Wang, Jiandong Huang, Zhiqiu Fang, Liming ren, Yongjun Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing Jiangsu Peoples R China Univ Wollongong Sch Comp & Informat Technol CCISR Wollongong NSW Australia Nanjing Univ Informat Sci Sch Comp & Software Nanjing Jiangsu Peoples R China
A conditional proxy re-encryption (CPre) scheme enables the proxy to convert a ciphertext from Alice to Bob, if the ciphertext satisfies one condition set by Alice. To improve the issue of more fine-grained on the con... 详细信息
来源: 评论
A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2020年 第9期7卷 7982-7990页
作者: Fang, Liming Zhang, Hanyi Li, Minghui Ge, Chunpeng Liu, Liang Liu, Zhe Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing 211106 Peoples R China Nanjing Univ Aeronaut & Astronaut State Key Lab Cryptol Nanjing 211106 Peoples R China
With the high popularity of IoT devices, industrial IoT platforms, such as smart factories and oilfield industrial control systems, have become a new trend in the development of smart city. Although various manufactur... 详细信息
来源: 评论
Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud
收藏 引用
IEEE TRANSACTIONS ON SERVICES COMPUTING 2021年 第4期14卷 1013-1025页
作者: Huang, Qinlong Yang, Yixian Fu, Jingyi Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Natl Engn Lab Disaster Backup & Recovery Beijing 100876 Peoples R China
Cloud computing has become increasingly popular among users and businesses around the world. Although cryptographic techniques can provide data protection for users in public cloud, several issues also remain problema... 详细信息
来源: 评论
reEDS: An Efficient revocable End-to-End Encrypted Message Distribution System for IoT
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECUre COMPUTING 2024年 第5期21卷 4526-4542页
作者: Li, Cui Chen, Rongmao Wang, Yi Xing, Qianqian Wang, Baosheng Natl Univ Def Technol Sch Comp Changsha 410073 Peoples R China Natl Univ Def Technol Sch Informat & Commun Xian 710106 Peoples R China
To address the confidentiality concerns of malicious adversaries that fully compromise the message broker in pub/sub based IoT systems, several researchers use proxy re-encryption (Pre) to realize end-to-end encrypted... 详细信息
来源: 评论