Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things
暂无分享,去创建一个
Sherali Zeadally | Debiao He | Neeraj Kumar | Kaitai Liang | Mimi Ma | Neeraj Kumar | D. He | K. Liang | S. Zeadally | Mimi Ma
[1] Qiong Huang,et al. An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks , 2017, Inf. Sci..
[2] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[3] Muhammad Khurram Khan,et al. Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing , 2015, Secur. Commun. Networks.
[4] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[5] Dong Hoon Lee,et al. Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.
[6] Jeng-Shyang Pan,et al. On the Security of a Certificateless Searchable Public Key Encryption Scheme , 2016, ICGEC.
[7] Chunhua Su,et al. Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data , 2016, AsiaCCS.
[8] Mingwu Zhang,et al. Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.
[9] Sk Hafizul Islam,et al. Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..
[10] Abhishek Singh,et al. Provably secure one-round certificateless authenticated group key agreement protocol for secure communications , 2015, Wirel. Pers. Commun..
[11] Wei Wang,et al. Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack , 2013, IEEE Transactions on Computers.
[12] Jianhua Chen,et al. Certificateless searchable public key encryption scheme for mobile healthcare system , 2017, Comput. Electr. Eng..
[13] Willy Susilo,et al. Public key encryption with keyword search secure against keyword guessing attacks without random oracle , 2013, Inf. Sci..
[14] Sherali Zeadally,et al. Handling big data: research challenges and future directions , 2016, The Journal of Supercomputing.
[15] Dong Hoon Lee,et al. Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..
[16] Mohammad S. Obaidat,et al. A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography , 2017, Int. J. Comput. Math..
[17] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[18] Peng Changgen,et al. Certificateless public key encryption with keyword search , 2014, China Communications.
[19] Kim-Kwang Raymond Choo,et al. Cloud Manufacturing: Security, Privacy, and Forensic Concerns , 2016, IEEE Cloud Computing.
[20] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[21] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[22] Yiwei Thomas Hou,et al. Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud , 2016, IEEE Transactions on Parallel and Distributed Systems.
[23] Jianhua Chen,et al. Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[24] Dong Hoon Lee,et al. Improved searchable public key encryption with designated tester , 2009, ASIACCS '09.
[25] Xingming Sun,et al. Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data , 2019, IEEE Transactions on Services Computing.
[26] Willy Susilo,et al. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.
[27] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[28] Mohammad S. Obaidat,et al. Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme , 2017, ICMC.
[29] Fuchun Guo,et al. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage , 2016, IEEE Transactions on Information Forensics and Security.
[30] Fuchun Guo,et al. Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data , 2016, IEEE Transactions on Information Forensics and Security.
[31] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[32] Fagen Li,et al. Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings , 2015, Comput. J..
[33] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.