Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage
暂无分享,去创建一个
Feng Lin | Yaping Lin | Shiwen Zhang | Xiehua Li | Voundi Koe Arthur Sandor | Yaping Lin | Xiehua Li | Shiwen Zhang | Feng Lin
[1] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[2] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[3] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Christian Esposito,et al. On Security in Publish/Subscribe Services: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[5] Wei Chen,et al. Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation , 2018, Int. J. Netw. Secur..
[6] Rajkumar Buyya,et al. Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.
[7] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[8] S. Katzenbeisser,et al. ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION , 2009 .
[9] Sourya Joyee De,et al. Efficient Decentralized Attribute Based Access Control for Mobile Clouds , 2020, IEEE Transactions on Cloud Computing.
[10] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[11] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[12] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[13] Sandeep K. Sood,et al. A combined approach to ensure data security in cloud computing , 2012, J. Netw. Comput. Appl..
[14] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[15] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[16] Wenfen Liu,et al. Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage , 2018, IEEE Systems Journal.
[17] Hongwei Liu,et al. An efficient access control scheme with outsourcing capability and attribute update for fog computing , 2018, Future Gener. Comput. Syst..
[18] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[19] Brent Waters,et al. Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.
[20] Abdullah Gani,et al. Mobile cloud computing: The-state-of-the-art, challenges, and future research , 2015 .
[21] Kemal Akkaya,et al. A survey of authentication schemes for vehicular ad hoc networks , 2011, Secur. Commun. Networks.
[22] Hyohyun Choi,et al. Toward Advanced Mobile Cloud Computing for the Internet of Things: Current Issues and Future Direction , 2014, Mobile Networks and Applications.
[23] Muttukrishnan Rajarajan,et al. Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.
[24] Noam Weingarten,et al. HealthShare: Using Attribute-Based Encryption for Secure Data Sharing between Multiple Clouds , 2017, 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS).
[25] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[26] Xiaodong Lin,et al. FINE: A fine-grained privacy-preserving location-based service framework for mobile devices , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.