Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System
暂无分享,去创建一个
Jianyong Chen | Jieming Wu | Bo Wang | Hongying Zheng | Jianyong Chen | Hongying Zheng | Jie-Jun Wu | Bo Wang
[1] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[2] G. Hema,et al. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re Encryption Function for E-Health Clouds , 2018 .
[3] Tianlong Gu,et al. A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram , 2017, IEEE Access.
[4] Milan Petkovic,et al. Secure management of personal health records by applying attribute-based encryption , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.
[5] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[6] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Ming Li. Record length requirement of long-range dependent teletraffic , 2017 .
[8] R.T.Subhalakshmi,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption , 2016 .
[9] Stefan Katzenbeisser,et al. Distributed Attribute-Based Encryption , 2009, ICISC.
[10] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[11] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[12] Rui Zhang,et al. Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme , 2013, IEEE Transactions on Parallel and Distributed Systems.
[13] Xiaohua Jia,et al. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.
[14] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[15] Xiaohui Liang,et al. Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority , 2008, INDOCRYPT.
[16] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[17] Wei Li,et al. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage , 2016, IEEE Transactions on Parallel and Distributed Systems.
[18] Jingquan Li. Ensuring Privacy in a Personal Health Record System , 2015, Computer.
[19] Ming Li. Fractal Time Series—A Tutorial Review , 2010 .
[20] Cong Wang,et al. Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.
[21] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[22] Bharat K. Bhargava,et al. On the Security of Data Access Control for Multiauthority Cloud Storage Systems , 2017, IEEE Transactions on Services Computing.
[23] Weixin Xie,et al. An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[24] Ivan Stojmenovic,et al. DACC: Distributed Access Control in Clouds , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[25] Weixin Xie,et al. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.