Parallel search over encrypted data under attribute based encryption on the Cloud Computing
暂无分享,去创建一个
[1] Rajkumar Buyya,et al. Cloud Computing Principles and Paradigms , 2011 .
[2] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[3] Radu Sion,et al. Proceedings of the 14th international conference on Financial cryptograpy and data security , 2010 .
[4] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[5] Milan Petkovic,et al. Secure management of personal health records by applying attribute-based encryption , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.
[6] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[7] Mudhakar Srivatsa,et al. Search-as-a-service: Outsourced search over outsourced storage , 2009, TWEB.
[8] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[9] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[10] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[11] Ronggang Zhang,et al. Access Control for the Smart Meters Based on ABE , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[12] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[13] Wenjing Lou,et al. Attribute-based content distribution with hidden policy , 2008, 2008 4th Workshop on Secure Network Protocols.
[14] Ieee Staff,et al. 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) , 2013 .
[15] Ali Miri,et al. Combining Attribute-Based and Access Systems , 2009, 2009 International Conference on Computational Science and Engineering.
[16] Sushmita Ruj,et al. Privacy Preserving Access Control with Authentication for Securing Data in Clouds , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[17] Thouraya Bouabana-Tebibel,et al. Access Control Aware Search on the Cloud Computing , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[18] Yong Cheng,et al. Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control , 2012, 2012 Second International Conference on Cloud and Green Computing.
[19] Ronald Cramer,et al. Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques , 2005 .
[20] Jiankun Hu,et al. A general transformation from KP-ABE to searchable encryption , 2014, Future Gener. Comput. Syst..
[21] Yacine Challal,et al. Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.
[22] Liwu Zhang,et al. KP-ABE Based Verifiable Cloud Access Control Scheme , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[23] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[24] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[25] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..
[26] Thouraya Bouabana-Tebibel,et al. Access control reinforcement over searchable encryption , 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).
[27] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.