Attribute based encryption made practical
暂无分享,去创建一个
[1] Dutch T. Meyer,et al. A study of practical deduplication , 2011, TOS.
[2] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[3] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[4] Idit Keidar,et al. Fail-Aware Untrusted Storage , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[5] Patrick Traynor,et al. Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems , 2008, NDSS.
[6] Darrell D. E. Long,et al. Strong Security for Network-Attached Storage , 2002, FAST.
[7] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[8] Jun Zhu,et al. Breaking up is hard to do: security and functionality in a commodity hypervisor , 2011, SOSP.
[9] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[10] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[11] Trent Jaeger,et al. Attestation-based policy enforcement for remote access , 2004, CCS '04.
[12] Hovav Shacham,et al. SiRiUS: Securing Remote Untrusted Storage , 2003, NDSS.