Comprehensive and Comparative Analysis of Different Files Using CP-ABE
暂无分享,去创建一个
Ashutosh Kumar Singh | Ishu Gupta | Sahil Jalwa | Vardaan Sharma | Abdur Rehman Siddiqi | Ashutosh Kumar Singh | A. R. Siddiqi | Ishu Gupta | Vardaan Sharma | Sahil Jalwa
[1] Ashutosh Kumar Singh,et al. Layer-based Privacy and Security Architecture for Cloud Data Sharing , 2019, Journal of Communications Software and Systems.
[2] Sangeeta Mittal,et al. Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for fine grained access control of university data , 2017, 2017 Tenth International Conference on Contemporary Computing (IC3).
[3] Ronald L. Rivest,et al. A knapsack-type public key cryptosystem based on arithmetic in finite fields , 1988, IEEE Trans. Inf. Theory.
[4] Ashutosh Kumar Singh,et al. Dynamic threshold based information leaker identification scheme , 2019, Inf. Process. Lett..
[5] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[6] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[8] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[9] Jiankun Hu,et al. A general transformation from KP-ABE to searchable encryption , 2014, Future Gener. Comput. Syst..
[10] Jianfeng Wang,et al. Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE , 2014, 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications.
[11] Ashutosh Kumar Singh,et al. A Probability based Model for Data Leakage Detection using Bigraph , 2017, ICCNS 2017.
[12] Ashutosh Kumar Singh,et al. A Probabilistic Approach for Guilty Agent Detection using Bigraph after Distribution of Sample Data , 2018 .