A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing
暂无分享,去创建一个
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Dongqing Xie,et al. Attribute-based signature and its applications , 2010, ASIACCS '10.
[3] Marek R. Ogiela,et al. Advances in Cognitive Information Systems , 2012, Cognitive Systems Monographs.
[4] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[5] Im-Yeong Lee,et al. Authentication protocol using an identifier in an ad hoc network environment , 2012, Math. Comput. Model..
[6] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] C. Pandu Rangan,et al. Attribute Based Signatures for Bounded Multi-level Threshold Circuits , 2010, EuroPKI.
[9] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[10] Marek R. Ogiela,et al. DNA-like linguistic secret sharing for strategic information systems , 2012, Int. J. Inf. Manag..
[11] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[12] Reihaneh Safavi-Naini,et al. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.
[13] Vipul Goyal,et al. Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..
[14] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[15] Manoj Prabhakaran,et al. Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..
[16] Bok-Min Goi,et al. On the Security of an Attribute-Based Signature Scheme , 2009 .
[17] Guo Shaniqng,et al. Attribute-based Signature Scheme , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[18] Paz Morillo,et al. Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model , 2011, AFRICACRYPT.
[19] Pieter H. Hartel,et al. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application , 2009, WISA.
[20] Jin Li,et al. Hidden attribute-based signatures without anonymity revocation , 2010, Inf. Sci..
[21] Tatsuaki Okamoto,et al. Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model , 2014, IEEE Transactions on Cloud Computing.
[22] Hideki Imai,et al. Conjunctive Broadcast and Attribute-Based Encryption , 2009, Pairing.
[23] Marek R. Ogiela,et al. Linguistic protocols for secure information management and sharing , 2012, Comput. Math. Appl..