Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT
暂无分享,去创建一个
Jianqing Zhang | Xinlei Wang | Eve M. Schooler | Mihaela Ion | E. Schooler | M. Ion | Xinlei Wang | Jianqing Zhang
[1] Brian Weis,et al. The Multicast Group Security Architecture , 2004, RFC.
[2] M V Patil,et al. HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING , 2006 .
[3] Mihaela Ion,et al. Security of Publish/Subscribe Systems , 2013 .
[4] Atsuko Miyaji,et al. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length , 2010, Int. J. Appl. Cryptogr..
[5] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[6] Jianqing Zhang,et al. Toward content-centric privacy in ICN: attribute-based encryption and routing , 2013, SIGCOMM 2013.
[7] Arjen K. Lenstra,et al. On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography , 2009, IACR Cryptol. ePrint Arch..
[8] Alfred Menezes,et al. Pairing-Based Cryptography at High Security Levels , 2005, IMACC.
[9] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[10] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .
[11] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[13] Cheng-Chi Lee,et al. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments , 2013, Int. J. Netw. Secur..
[14] Yao Zheng,et al. Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption , 2011 .
[15] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[16] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[17] Qinghua Li,et al. iHEMS: An information-centric approach to secure home energy management , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).
[18] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[19] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[20] Ben Lynn,et al. On the implementation of pairing-based cryptosystems , 2007 .
[21] Jin Li,et al. Outsourcing Encryption of Attribute-Based Encryption with MapReduce , 2012, ICICS.