Search

Your search keyword '"ciphertext-policy attribute-based encryption"' showing total 140 results

Search Constraints

Start Over You searched for: Descriptor "ciphertext-policy attribute-based encryption" Remove constraint Descriptor: "ciphertext-policy attribute-based encryption"
140 results on '"ciphertext-policy attribute-based encryption"'

Search Results

1. Designing quantum-secure attribute-based encryption.

2. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things.

3. An access control scheme for IoT based on smart contracts and CP-ABE

4. Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption.

5. 面向物联网的基于智能合约与CP-ABE的访问控制方案.

6. An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems.

7. Obfuscating Ciphertext-Policy Attribute-Based Re-Encryption for Sensor Networks with Cloud Storage.

8. 车载社交网中基于密文属性加密的车队车辆数据 共享方案.

11. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things

12. An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems

13. Soft Set Decision and Cluster Percolation Method-Based Policy Clustering and Encryption Optimization for CP-ABE.

14. A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability

15. Blockchain-Driven Revocable Ciphertext-Policy Attribute-Based Encryption for Public Cloud Data Sharing

16. Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation.

19. Lazy-mode Ciphertext-update Based Approach for CP-ABE Attribute Change

20. 集群式农产品供应链区块链密文策略可验多部门监管方案.

21. Soft Set Decision and Cluster Percolation Method-Based Policy Clustering and Encryption Optimization for CP-ABE

22. Cross-Domain Attribute-Based Access Control Encryption

24. Attribute-Based Elliptic Curve Encryption for Security in Sensor Cloud

25. TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE

26. 可防止无关属性干扰的属性基加密方案.

27. Blockchain-Assisted Collaborative Service Recommendation Scheme With Data Sharing

28. Security-Aware Information Dissemination With Fine-Grained Access Control in Cooperative Multi-RSU of VANETs.

29. RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage.

30. Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation

31. Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption

32. Key escrow-free attribute based encryption with user revocation.

33. Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid

34. A Ciphertext-Policy Attribute-Based Encryption Based on Multi-valued Decision Diagram

35. BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing.

36. A secure, efficient and verifiable multimedia data sharing scheme in fog networking system.

37. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption in Multi-Domain Environment

38. k-times attribute-based authentication scheme using direct anonymous attestation

39. An Efficient Framework for Verifiable Access Control Based Dynamic Data Updates in Public Cloud

40. Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing.

41. Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search.

42. A fully distributed hierarchical attribute-based encryption scheme.

43. An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update.

44. A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud.

45. An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud.

46. An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures

47. A Lightweight Cloud Sharing PHR System With Access Policy Updating

48. Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks

49. Anonymous-CPABE: Privacy Preserved Content Disclosure for Data Sharing in Cloud

Catalog

Books, media, physical & digital resources