CORC

浏览/检索结果: 共20条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Flexible attribute-based proxy re-encryption for efficient data sharing 期刊论文
Information Sciences, 2020, 卷号: 511, 页码: 94-113
作者:  Deng, Hua;  Qin, Zheng;  Wu, Qianhong;  Guan, Zhenyu;  Zhou, Yunya
收藏  |  浏览/下载:37/0  |  提交时间:2019/12/30
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 11688-11697
作者:  Li, Dawei;  Liu, Jianwei;  Wu, Qianhong;  Guan, Zhenyu
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/30
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation 会议论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019-11-10
作者:  Zhang, Xiao;  Wu, Faguo;  Yao, Wang;  Wang, Zhao;  Wang, Wenhua
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/30
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 卷号: 31
作者:  Zhang, Xiao;  Wu, Faguo;  Yao, Wang;  Wang, Zhao;  Wang, Wenhua
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10726 LNCS, 页码: 278-298
作者:  Feng, H.;  Liu, J.;  Wu, Q.;  Liu, W.
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/30
Achieving Flexible and Self-Contained Data Protection in Cloud Computing 期刊论文
IEEE ACCESS, 2017, 卷号: 5, 页码: 1510-1523
作者:  Lang, Bo;  Wang, Jinmiao;  Liu, Yanxi
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Confidentiality-Preserving Publicly Verifiable Computation 会议论文
10th International Conference on Provable Security (ProvSec), Nanjing Univ Finance & Econ, Nanjing, PEOPLES R CHINA, 2017-09-01
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Confidentiality-Preserving Publicly Verifiable Computation 期刊论文
10th International Conference on Provable Security (ProvSec), 2017, 卷号: 28, 页码: 799-818
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption 会议论文
9th International Symposium on Cyberspace Safety and Security, CSS 2017, Xi'an, China, 2017-10-23
作者:  Li, Dawei;  Chen, Jie;  Liu, Jianwei;  Wu, Qianhong;  Liu, Weiran
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30
An Efficient KP-ABE Scheme for Content Protection in Information-Centric Networking 会议论文
IEEE Symposium on Computers and Communication (ISCC), Messina, ITALY, 2016-01-01
作者:  Wang, Jinmiao;  Lang, Bo
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace