Top results
international journal of computational intelligence and informatics, vol. 5: no. 3, december 2015 issn: 2349 - 6363 244 hybrid algorithms tor-rct-trem v.poongodi1 1research
fame: fast attribute-based message encryption∗ be the natural cryptographic tool for building various types of conditional access systems with far-reaching applications,
privacy preserving attribute-based encryption with conjunctive keyword search for e-health records in cloudjuly 2021, volume 13, number 2 (pp. 87–100) http://www.isecure-journal.org
qi li ,1,2,3 hongbo zhu,3 zuobin ying,4 and tao zhang5 1 school of computer science, nanjing university of posts and telecommunications, nanjing 210023, china 2jiangsu key
the lord of the shares: combining attribute-based encryption and searchable encryption for flexible data sharing antonis michalas10000−0002−0189−3520 tampere university…
corporate office: - spiro solutions pvt. ltd, #78, 3rd floor, ushman road, t.nagar, chennai –17, (upstairs of hotalsaravanabhavan) mobile – 9791 044 044,9176 644 044.…
human attribute recognition by deep hierarchical contexts yining li chen huang chen change loy and xiaoou tang department of information engineering the chinese university…
international research journal of engineering and technology (irjet) e-issn: 2395-0056 volume: 05 issue: 03 | mar-2018 www.irjet.net p-issn: 2395-0072 © 2018, irjet | impact…
research article searchable attribute-based encryption scheme with attribute revocation in cloud storage shangping wang1 duqiao zhao1* yaling zhang2 1 school of science xi’an…
feasibility of end-to-end encryption using attribute based encryption in health care dennis schroer [email protected] university of twente p.o. box 217, 7500ae…
© 2019 ijrti volume 4 issue 1 issn: 2456-3315 ijrti1901002 international journal for research trends and innovation wwwijrtiorg 13 advance attribute based encryption for…
slide 1 crypto tutorial homomorphic encryption proofs of retrievability/possession attribute-based encryption hidden-vector encryption, predicate encryption identity-based…
slide 1 ciphertext-policy attribute-based encryption (cp-abe) presented by sherley codio fall, 2011 - privacy&security - virginia tech – computer science click to edit…
slide 1 ciphertext-policy attribute-based encryption (cp-abe) presented by sherley codio fall, 2011 - privacy&security - virginia tech – computer science click to edit…
attribute-based encryption optimized for cloud computing? máté horváth [email protected] laboratory of cryptography and system security (crysys lab)?? abstract. in…
presented by- ankit raj (1309113012) aqib jamal (1309113017) nisha gupta (1309113056) akash prajapati (1309113008) authentication on cloud using attribute based encryption…
sharif university of technology scientia iranica transactions d: computer science & engineering and electrical engineering http://scientiairanica.sharif.edu an attribute-based
a role and attribute based encryption approach to privacy and security in cloud based health services by daniel servos a thesis submitted to the faculty of graduate studies…
human attribute recognition by deep hierarchical contexts yining li chen huang chen change loy and xiaoou tang department of information engineering the chinese university…
srame: an attribute based message encryption scheme with keyword search and attribute revocation ruoqing zhang1 lucas hui2 sm yiu1 gongxian zeng1 jing wen1 and zechao liu3…