Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid
暂无分享,去创建一个
Xiaojiang Du | Longfei Wu | Jing Li | Jun Wu | Yue Zhang | Zhitao Guan | Jun Wu | Xiaojiang Du | Zhitao Guan | Longfei Wu | Yue Zhang | Jing Li
[1] Nuttapong Attrapadung,et al. Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts , 2011, Public Key Cryptography.
[2] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[3] Zhenfu Cao,et al. Multi-use and unidirectional identity-based proxy re-encryption schemes , 2010, Inf. Sci..
[4] Jie Wu,et al. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment , 2014, Inf. Sci..
[5] Jiankun Hu,et al. A General Transformation from KP-ABE to Searchable Encryption , 2012, CSS.
[6] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.
[7] AtenieseGiuseppe,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006 .
[8] Robert H. Deng,et al. Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.
[9] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[10] Cheng Chen,et al. Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts , 2012, ACISP.
[11] Muttukrishnan Rajarajan,et al. Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.
[12] Robert H. Deng,et al. Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption , 2014, AsiaCCS.
[13] Qinyi Li,et al. An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext , 2013, Int. J. Netw. Secur..
[14] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[15] Wen-Guey Tzeng,et al. Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.
[16] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[17] Xiaojiang Du,et al. Biometric-based two-level secure access control for Implantable Medical Devices during emergencies , 2011, 2011 Proceedings IEEE INFOCOM.
[18] Mohsen Guizani,et al. Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[19] David M. Eyers,et al. Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.
[20] Hongming Cai,et al. An IoT-Oriented Data Storage Framework in Cloud Computing Platform , 2014, IEEE Transactions on Industrial Informatics.
[21] Shouhuai Xu,et al. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[22] Rui Zhang,et al. A Blockchain based Access Control System for Cloud Storage , 2019 .
[23] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[24] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[25] Qixiang Mei,et al. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption , 2016, IEEE Transactions on Dependable and Secure Computing.
[26] Adi Shamir,et al. How to share a secret , 1979, CACM.
[27] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[28] Yi Mu,et al. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption , 2015, IEEE Transactions on Information Forensics and Security.
[29] W. Marsden. I and J , 2012 .
[30] Jie Wu,et al. Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[31] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[33] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[34] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[35] Jianfeng Ma,et al. Key-Policy Weighted Attribute based Encryption for fine-grained access control , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[36] Xingming Sun,et al. Data Access Control for Multi-authority Cloud Storage Systems , 2014, IIH-MSP.
[37] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[38] Wei Yu,et al. A cloud computing based architecture for cyber security situation awareness , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[39] Mayank Dave,et al. Secure data storage operations with verifiable outsourced decryption for mobile cloud computing , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).
[40] Zhibin Zhou,et al. Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).