A Distributed Access Control with Outsourced Computation in Fog Computing
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Ruei-Hau Hsu,et al. Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions , 2019, IEEE Consumer Electronics Magazine.
[3] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[4] Kim-Kwang Raymond Choo,et al. Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective , 2017, IEEE Cloud Computing.
[5] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[6] Huaqun Wang,et al. Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems , 2017, IEEE Access.
[7] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[8] Mohamed Amine Ferrag,et al. Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.
[9] Rui Guo,et al. A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience , 2018, Secur. Commun. Networks.
[10] Moni Naor,et al. How to Share a Secret, Infinitely , 2016, IEEE Transactions on Information Theory.
[11] Jian Shen,et al. Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices , 2017, Soft Comput..
[12] Hao Wang,et al. New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems , 2016, J. High Speed Networks.
[13] Jinguang Han,et al. VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud , 2020, IEEE Transactions on Services Computing.
[14] Huaqun Wang,et al. Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme , 2012, IET Inf. Secur..
[15] Victor I. Chang,et al. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..
[16] Qixiang Mei,et al. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption , 2016, IEEE Transactions on Dependable and Secure Computing.
[17] R.T.Subhalakshmi,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption , 2016 .
[18] Huaqun Wang,et al. Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession , 2019, IEEE Transactions on Services Computing.
[19] Xiaofeng Liao,et al. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.
[20] Dijiang Huang,et al. Efficient Attribute-Based Comparable Data Access Control , 2015, IEEE Transactions on Computers.
[21] Hsiao-Hwa Chen,et al. An Integrated Architecture for Software Defined and Virtualized Radio Access Networks with Fog Computing , 2017, IEEE Network.
[22] Willy Susilo,et al. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.
[23] Chen Yanli,et al. Attribute-based access control for multi-authority systems with constant size ciphertext in cloud computing , 2016 .
[24] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[25] Sourya Joyee De,et al. Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption , 2014, GLOBECOM 2014.
[26] Hu Yuxiang,et al. Using the cooperative game for service placement of virtual network functions , 2016, China Communications.
[27] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[28] Joseph K. Liu,et al. Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption , 2015, Future Gener. Comput. Syst..
[29] Josep Domingo-Ferrer,et al. FRR: Fair remote retrieval of outsourced private medical records in electronic health networks , 2014, J. Biomed. Informatics.
[30] Robert H. Deng,et al. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.
[31] Y. Sreenivasa Rao,et al. A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing , 2017, Future Gener. Comput. Syst..
[32] Ivan Stojmenovic,et al. Distributed Fine-Grained Access Control in Wireless Sensor Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.
[33] Rui Guo,et al. Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud , 2017, ICCCS.
[34] Ling Liu,et al. Searchable Encryption for Healthcare Clouds: A Survey , 2018, IEEE Transactions on Services Computing.
[35] Xin Wang,et al. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing , 2017, Sensors.