Search

Your search keyword '"ciphertext-policy attribute-based encryption"' showing total 20 results

Search Constraints

Start Over You searched for: Descriptor "ciphertext-policy attribute-based encryption" Remove constraint Descriptor: "ciphertext-policy attribute-based encryption" Publisher ieee Remove constraint Publisher: ieee
20 results on '"ciphertext-policy attribute-based encryption"'

Search Results

1. Blockchain-Assisted Collaborative Service Recommendation Scheme With Data Sharing

2. Security-Aware Information Dissemination With Fine-Grained Access Control in Cooperative Multi-RSU of VANETs.

3. RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage.

4. Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid

5. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption in Multi-Domain Environment

6. Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing.

7. Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search.

8. A Lightweight Cloud Sharing PHR System With Access Policy Updating

9. A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram

10. Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts

11. Achieving Flexible and Self-Contained Data Protection in Cloud Computing

12. Blockchain-Assisted Collaborative Service Recommendation Scheme With Data Sharing

13. Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid

14. Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing.

16. A novel dynamic key management scheme for wireless sensor networks.

17. A Lightweight Cloud Sharing PHR System With Access Policy Updating

18. fABElous: An Attribute-Based Scheme for Industrial Internet of Things

19. Achieving Flexible and Self-Contained Data Protection in Cloud Computing

20. Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds.

Catalog

Books, media, physical & digital resources