Secure and Policy-Private Resource Sharing in an Online Social Network
暂无分享,去创建一个
[1] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[2] Barbara Carminati,et al. Enforcing access control in Web-based social networks , 2009, TSEC.
[3] Brent Waters,et al. Secure attribute-based systems , 2010, J. Comput. Secur..
[4] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.
[5] Vincenzo Iovino,et al. Hidden-Vector Encryption with Groups of Prime Order , 2008, Pairing.
[6] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[7] Avishai Wool,et al. Toward securing untrusted storage without public-key operations , 2005, StorageSS '05.
[8] Angelo De Caro,et al. Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts , 2010, Pairing.
[9] Frank Stajano,et al. Privacy-enabling social networking over untrusted networks , 2009, WOSN '09.
[10] Barbara Carminati,et al. Privacy-Aware Access Control in Social Networks: Issues and Solutions , 2010 .
[11] Angelo De Caro,et al. jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[12] Patrick Traynor,et al. Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems , 2008, NDSS.