Identity-based encryption with authorized equivalence test for cloud-assisted IoT
暂无分享,去创建一个
[1] Attila A. Yavuz,et al. Lattice-Based Public Key Searchable Encryption from Experimental Perspectives , 2020, IEEE Transactions on Dependable and Secure Computing.
[2] Hu Xiong,et al. An efficient certificateless public key cryptography with authorized equality test in IIoT , 2020, J. Ambient Intell. Humaniz. Comput..
[3] Hu Xiong,et al. Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things , 2020, IEEE Transactions on Industrial Informatics.
[4] Fagen Li,et al. IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks , 2019, Mobile Networks and Applications.
[5] Fagen Li,et al. An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid , 2019, J. Syst. Archit..
[6] Hao Zhang,et al. Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing , 2019, IEEE Systems Journal.
[7] Hao Zhang,et al. Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing , 2019, Future Gener. Comput. Syst..
[8] Hu Xiong,et al. Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles , 2019, IEEE Access.
[9] Jian Shen,et al. Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage , 2019, IEEE Access.
[10] Yang Lu,et al. Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems , 2018, Cluster Computing.
[11] Johnny S. Wong,et al. Cloud and IoT-based emerging services systems , 2018, Cluster Computing.
[12] Natalia G. Miloslavskaya,et al. Internet of Things: information security challenges and solutions , 2018, Cluster Computing.
[13] Robert H. Deng,et al. Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices , 2018, IEEE Transactions on Industrial Informatics.
[14] Yanan Zhao,et al. A Heterogeneous Systems Public Key Encryption with Equality Test in Smart City , 2018 .
[15] Kim-Kwang Raymond Choo,et al. Efficient Identity-Based Encryption Scheme with Equality Test in Smart City , 2018, IEEE Transactions on Sustainable Computing.
[16] Kim-Kwang Raymond Choo,et al. Efficient and secure identity-based encryption scheme with equality test in cloud computing , 2017, Future Gener. Comput. Syst..
[17] Ming Wang,et al. Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks , 2017, IEEE Access.
[18] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[19] Xiaohui Liang,et al. Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.
[20] Huaxiong Wang,et al. Semi-generic construction of public key encryption and identity-based encryption with equality test , 2016, Inf. Sci..
[21] Jianhong Zhang,et al. Efficient public key encryption with revocable keyword search in cloud computing , 2016, Cluster Computing.
[22] Sha Ma,et al. Identity-based encryption with outsourced equality test in cloud computing , 2016, Inf. Sci..
[23] Kaibin Huang,et al. PKE-AET: Public Key Encryption with Authorized Equality Test , 2015, Comput. J..
[24] Schahram Dustdar,et al. Principles for Engineering IoT Cloud Systems , 2015, IEEE Cloud Computing.
[25] Mingwu Zhang,et al. Public Key Encryption with Delegated Equality Test in a Multi-User Setting , 2015, Comput. J..
[26] Mingwu Zhang,et al. Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.
[27] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[28] Gerhard P Hancke,et al. Introduction to Industrial Control Networks , 2013, IEEE Communications Surveys & Tutorials.
[29] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[30] Qiang Tang,et al. Public key encryption supporting plaintext equality test and user-specified authorization , 2012, Secur. Commun. Networks.
[31] Qiang Tang,et al. Public key encryption schemes supporting equality test with authorisation of different granularity , 2012, Int. J. Appl. Cryptogr..
[32] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[33] Qiang Tang,et al. Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization , 2011, ACISP.
[34] A. Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[35] Guomin Yang,et al. Probabilistic Public Key Encryption with Equality Test , 2010, CT-RSA.
[36] Anis Laouiti,et al. Vehicle Ad Hoc networks: applications and related technical issues , 2008, IEEE Communications Surveys & Tutorials.
[37] Mihir Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2005, Journal of Cryptology.
[38] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[39] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[40] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[41] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.