Location-based data access control scheme for Internet of Vehicles
暂无分享,去创建一个
Hong Qin | Hao Wang | Wenying Zhang | Mei Jiang | Xi Sun
[1] Hao Wang,et al. Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud , 2019, Secur. Commun. Networks.
[2] Sherman S. M. Chow,et al. Improving privacy and security in multi-authority attribute-based encryption , 2009, CCS.
[3] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[4] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[5] Zhenfu Cao,et al. Positioning-Protocol-Based Digital Signature , 2014, WICON.
[6] Jin Li,et al. Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.
[7] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[8] Amit Sahai,et al. Bounded Ciphertext Policy Attribute Based Encryption , 2008, ICALP.
[9] Hao Wang,et al. Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing , 2016, Soft Computing.
[10] Robert H. Deng,et al. Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption , 2015, IEEE Transactions on Information Forensics and Security.
[11] Brent Waters,et al. Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption , 2015, Financial Cryptography.
[12] Yi Mu,et al. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption , 2015, IEEE Transactions on Information Forensics and Security.
[13] Jin Li,et al. Efficient attribute-based data sharing in mobile clouds , 2016, Pervasive Mob. Comput..
[14] Hao Wang,et al. New directly revocable attribute-based encryption scheme and its application in cloud storage environment , 2016, Cluster Computing.
[15] Hao Wang,et al. Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain , 2018, Journal of Medical Systems.
[16] Allison Bishop,et al. Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[17] Xiaohui Liang,et al. Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority , 2008, INDOCRYPT.
[18] Yacine Ghamri-Doudane,et al. Software defined networking-based vehicular Adhoc Network with Fog Computing , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[19] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.