An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing
暂无分享,去创建一个
Xiaojiang Du | Jun Wu | Zhitao Guan | Zijian Zhang | Jing Li | Jun Wu | Xiaojiang Du | Zhitao Guan | Zijian Zhang | Jing Li
[1] Mohsen Guizani,et al. Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[2] Xiaojiang Du,et al. A lightweight access control mechanism for mobile cloud computing , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[3] Xiaojiang Du,et al. Practical and privacy-assured data indexes for outsourced cloud data , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[4] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[5] Xiaojiang Du,et al. Cuckoo: flexible compute-intensive task offloading in mobile cloud computing , 2016, Wirel. Commun. Mob. Comput..
[6] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[7] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[8] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[9] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[10] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[11] Xiaojiang Du,et al. Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.
[12] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[13] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[14] Xiaojiang Du,et al. Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System , 2015, IEEE Transactions on Parallel and Distributed Systems.
[15] Jie Wu,et al. Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[16] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[17] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.
[19] Rui Zhang,et al. A Blockchain based Access Control System for Cloud Storage , 2019 .