Top results
c om p u t e r s & s e c u r i t y 3 0 ( 2 0 1 1 ) 3 2 0e3 3 1 ava i lab le a t www.sc iencedi rec t .com journa l homepage : www.e lsev ier . com/ loca te /cose hierarchical…
research article searchable attribute-based encryption scheme with attribute revocation in cloud storage shangping wang1 duqiao zhao1* yaling zhang2 1 school of science xi’an…
an attribute-based encryption scheme with revocation for fine-grained access control in wireless body area networks ye tian 12 yanbin peng 1 xinguang peng 1 hongbin li 2…
journal of information security 2017 8 203-222 http:wwwscirporgjournaljis issn online: 2153-1242 issn print: 2153-1234 doi: 104236jis201783014 july 14 2017 attribute-based…
practical attribute-based encryption: traitor tracing revocation and large universe zhen liu1 and duncan s wong2 1 city university of hong kong hong kong sar china zhenliu7-c@mycityueduhk…
attribute-based encryption (20110705) threshold abe (20110719) kp-abe (20110719) cp-abe (20111003) v2 * attribute-based encryption [sw05] threshold abe [gpsw06] key-policy…
volume no: 2 (2015), issue no: 3 (march) march 2015 www.ijmetmr.com page 328 issn no: 2348-4845 international journal & magazine of engineering, technology, management…
international journal of applied engineering research issn 0973-4562 volume 13, number 8 (2018) pp. 6138-6150 © research india publications. http://www.ripublication.com…
fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption allison lewko1 ?, tatsuaki okamoto2, amit sahai3 ??, katsuyuki…
hybrid attribute-based encryption and re-encryption for scalable mobile applications in clouds piotr k. tysowski and m. anwarul hasan dept. of electrical & computer engineering…
international journal of engineering research issn:2319-6890)(online),2347-5013(print) volume no.5, issue no.5, pp : 389-393 1 may 2016 ijer@2016 doi : 10.17950/ijer/v5s5/511…
ciphertext-policy, attribute-based encryption brent waters sri international john bethencourt cmu amit sahai ucla what is ciphertext-policy attribute-based encryption (cp-abe)?…
ciphertext-policy attribute-based encryption online/offline attribute-based encryption brent waters susan hohenberger presented by shai halevi test access control by encryption…
ciphertext-policy, attribute-based encryption brent waters sri international john bethencourt cmu amit sahai ucla * what is ciphertext-policy attribute-based encryption (cp-abe)?…
international journal of computer applications 0975 – 8887 volume 103 – no.10, october 2014 9 message privacy with load balancing using attribute based encryption jyoti…
1 university of westminster, london, united kingdom {h.dang,a.ullah}@westminster.ac.uk 2 tampere university, tampere, finland {antonios.michalas,alexandros.bakas}@tuni.fi
international journal of computational intelligence and informatics, vol. 5: no. 3, december 2015 issn: 2349 - 6363 244 hybrid algorithms tor-rct-trem v.poongodi1 1research
fame: fast attribute-based message encryption∗ be the natural cryptographic tool for building various types of conditional access systems with far-reaching applications,
privacy preserving attribute-based encryption with conjunctive keyword search for e-health records in cloudjuly 2021, volume 13, number 2 (pp. 87–100) http://www.isecure-journal.org
qi li ,1,2,3 hongbo zhu,3 zuobin ying,4 and tao zhang5 1 school of computer science, nanjing university of posts and telecommunications, nanjing 210023, china 2jiangsu key