A group key-policy attribute-based encryption with partial outsourcing decryption in wireless sensor networks
暂无分享,去创建一个
[1] Yacine Challal,et al. Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.
[2] Wenjing Lou,et al. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2011 .
[3] Jing Liu,et al. Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks , 2015, ICA3PP.
[4] Josep Domingo-Ferrer,et al. FRR: Fair remote retrieval of outsourced private medical records in electronic health networks , 2014, J. Biomed. Informatics.
[5] Jianfeng Ma,et al. Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks , 2010, Ad Hoc Sens. Wirel. Networks.
[6] Junbeom Hur,et al. Fine-grained data access control for distributed sensor networks , 2011, Wirel. Networks.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Sandip Roy,et al. Cryptanalysis and enhancement of a distributed fine-grained access control in wireless sensor networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[9] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[10] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[11] Su Jin,et al. Attribute-Based Encryption Schemes , 2011 .
[12] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[13] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[14] Hua Ma,et al. Outsourcing Decryption of Multi-Authority ABE Ciphertexts , 2014, Int. J. Netw. Secur..
[15] Kyung-Ah Shim,et al. ${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks , 2012, IEEE Transactions on Vehicular Technology.
[16] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[17] Chunhua Jin,et al. Practical Signcryption for Secure Communication of Wireless Sensor Networks , 2016, Wireless Personal Communications.
[18] Ivan Stojmenovic,et al. Distributed Fine-Grained Access Control in Wireless Sensor Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.
[19] Liusheng Huang,et al. Security of a Biometric Identity-based Encryption Scheme , 2012, Int. J. Netw. Secur..
[20] Shilpashree Srinivasamurthy,et al. Survey on Cloud Computing Security , 2010 .
[21] Wensheng Zhang,et al. Securing distributed data storage and retrieval in sensor networks , 2007, Pervasive Mob. Comput..
[22] Chunhua Jin,et al. Certificateless online/offline signcryption for the Internet of Things , 2015, Wireless Networks.
[23] Xiao-Feng Wang,et al. Attribute-Based Encryption Schemes: Attribute-Based Encryption Schemes , 2011 .
[24] Yaowei Zhou,et al. Key-insulated encryption based group key management for wireless sensor network , 2013 .
[25] Brent Waters,et al. Online/Offline Attribute-Based Encryption , 2014, IACR Cryptol. ePrint Arch..
[26] Junbeom Hur,et al. Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid , 2013, IEEE Transactions on Parallel and Distributed Systems.