Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Hiroaki Anada, Seiko Arita |
Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMARTCOMP ![In: 2017 IEEE International Conference on Smart Computing, SMARTCOMP 2017, Hong Kong, China, May 29-31, 2017, pp. 1-6, 2017, IEEE Computer Society, 978-1-5090-6517-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Nityananda Sarma |
A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017., pp. 11-18, 2017, ACM. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Geng Wang, Xiao Zhang, Yanmei Li |
Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers, pp. 223-241, 2017, Springer, 978-3-319-75159-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Junjie Zeng |
Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSS ![In: Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Xi'an, China, October 23-25, 2017, Proceedings, pp. 337-351, 2017, Springer, 978-3-319-69470-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Waqas Ahmad 0004, Shengling Wang 0001, Sheharyar, Zahid Mahmood |
Outsourced Ciphertext-Policy based Privacy Preservation for Mobile Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIKI ![In: 2017 International Conference on Identification, Information and Knowledge in the Internet of Things, IIKI 2017, Shandong, China, October 19-21, 2017, pp. 128-134, 2017, Elsevier. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Hua Ma, Enting Dong, Zhenhua Liu 0001, Linchao Zhang |
Privacy-Preserving Multi-authority Ciphertext-Policy Attribute-Based Encryption with Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BWCCA ![In: Advances on Broad-Band Wireless Computing, Communication and Applications, Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, BWCCA 2017, Barcelona, Spain, November 8-10, 2017., pp. 811-820, 2017, Springer, 978-3-319-69810-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Steve Moffat, Mohammad Hammoudeh, Robert Hegarty |
A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFNDS ![In: Proceedings of the International Conference on Future Networks and Distributed Systems, ICFNDS 2017, Cambridge, United Kingdom, July 19-20, 2017, pp. 34, 2017, ACM, 978-1-4503-4844-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Changji Wang, Jiayuan Wu, Yuan Yuan, Jing Liu |
Insecurity of Cheng et al.'s Efficient Revocation in Ciphertext-Policy Attribute-Based Encryption Based Cryptographic Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA/IUCC ![In: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, China, December 12-15, 2017, pp. 1387-1393, 2017, IEEE, 978-1-5386-3790-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Shardha Porwal, Sangeeta Mittal |
Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for fine grained access control of university data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3 ![In: Tenth International Conference on Contemporary Computing, IC3 2017, Noida, India, August 10-12, 2017, pp. 1-7, 2017, IEEE Computer Society, 978-1-5386-3077-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Guang Zeng |
Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 172-179, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Xinyu Feng 0002, Cong Li, Dan Li, Yuejian Fang, Qingni Shen |
Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings, pp. 192-204, 2017, Springer, 978-3-319-89499-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Minqian Wang, Zhenfeng Zhang, Cheng Chen |
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 28(4), pp. 1237-1245, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Jie Xu 0038, Qiaoyan Wen, Wenmin Li 0001, Zhengping Jin |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 27(1), pp. 119-129, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Hao Wang 0007, Zhihua Zheng, Lei Wu 0011, Debiao He |
New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. High Speed Networks ![In: J. High Speed Networks 22(2), pp. 153-167, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Lixian Liu, Junzuo Lai, Robert H. Deng, Yingjiu Li |
Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(18), pp. 4897-4913, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo |
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 11(1), pp. 35-45, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Haiping Wang, Jingjing Zhao |
隐藏访问结构的密文策略的属性基加密方案 (Ciphertext-policy Attribute-based Encryption with Anonymous Access Structure). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 43(2), pp. 175-178, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Zhitao Guan, Jing Li 0006, Zijian Zhang 0001, Liehuang Zhu |
Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Inf. Syst. ![In: Mob. Inf. Syst. 2016, pp. 1493290:1-1493290:10, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Siyu Xiao, Aijun Ge 0001, Fushan Wei, Chuangui Ma |
Ciphertext-Policy Attribute Based Encryption with Large Attribute Universe. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3PGCIC ![In: Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings of the 11th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2016, Soonchunhyang University, Asan, South Korea, November 5-7, 2016., pp. 115-122, 2016, Springer, 978-3-319-49108-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Hua Zheng, Xi Zhang, Qi Yang |
An Improved Ciphertext-Policy Attribute-Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartCom ![In: Smart Computing and Communication - First International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedings, pp. 400-411, 2016, Springer, 978-3-319-52014-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Yinhao Jiang, Willy Susilo, Yi Mu 0001, Fuchun Guo |
Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP (1) ![In: Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I, pp. 477-494, 2016, Springer, 978-3-319-40252-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Lifeng Li, Xiaowan Chen, Hai Jiang 0003, Zhongwen Li, Kuan-Ching Li |
P-CP-ABE: Parallelizing Ciphertext-Policy Attribute-Based Encryption for clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2016, Shanghai, China, May 30 - June 1, 2016, pp. 575-580, 2016, IEEE Computer Society, 978-1-5090-2239-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Shahriar Rahman, Anirban Basu 0001, Shinsaku Kiyomoto |
Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trustcom/BigDataSE/ISPA ![In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016, pp. 1759-1764, 2016, IEEE, 978-1-5090-3205-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Hui Cui 0001, Robert H. Deng, Guowei Wu, Junzuo Lai |
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings, pp. 19-38, 2016, 978-3-319-47421-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Gang Yu, Zhenfu Cao, Guang Zeng, Wenbao Han |
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings, pp. 3-18, 2016, 978-3-319-47421-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Nyamsuren Vaanchig, Wei Chen, Zhiguang Qin |
Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBD ![In: International Conference on Advanced Cloud and Big Data, CBD 2016, Chengdu, China, August 13-16, 2016, pp. 186-193, 2016, IEEE Computer Society, 978-1-5090-3677-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Sadikin Rifki, Youngho Park, Sangjae Moon |
A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 31(1), pp. 247-265, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
21 | Kaitai Liang, Liming Fang 0001, Duncan S. Wong, Willy Susilo |
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 27(8), pp. 2004-2027, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Xingbing Fu, Shengke Zeng, Fagen Li |
Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 17(6), pp. 661-671, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
21 | Zhibin Zhou 0001, Dijiang Huang, Zhijie Wang 0002 |
Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 64(1), pp. 126-138, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Xingbing Fu, Xuyun Nie, Fagen Li |
Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 6(3), pp. 481-493, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu 0002, Anjia Yang |
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 52, pp. 95-108, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Jianghua Liu, Xinyi Huang 0001, Joseph K. Liu |
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 52, pp. 67-76, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Liao Zhenhua, Wang Jinmiao, Lang Bo |
A ciphertext-policy hidden vector encryption scheme supporting multiuser keyword search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(6), pp. 879-887, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Qi Li 0011, Jianfeng Ma 0001, Rui Li 0047, Jinbo Xiong, Ximeng Liu |
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(18), pp. 4098-4109, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Y. Sreenivasa Rao, Ratna Dutta |
Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(18), pp. 4157-4176, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Jinguang Han, Willy Susilo, Yi Mu 0001, Jianying Zhou 0001, Man Ho Allen Au |
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 10(3), pp. 665-678, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei, Xiaodong Lin 0001 |
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 10(6), pp. 1274-1288, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei |
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 613, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
21 | Benjamin Wesolowski, Pascal Junod |
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 836, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
21 | Umesh Chandra Yadav, Syed Taqi Ali |
Ciphertext policy-hiding attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACCI ![In: 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, Kochi, India, August 10-13, 2015, pp. 2067-2071, 2015, IEEE, 978-1-4799-8790-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Ziying Wang, Jian Wang 0038 |
A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: Cloud Computing and Security - First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers, pp. 38-48, 2015, Springer, 978-3-319-27050-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Zhen Liu 0008, Duncan S. Wong |
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers, pp. 127-146, 2015, Springer, 978-3-319-28165-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto |
Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITCS ![In: 5th International Conference on IT Convergence and Security, ICITCS 2015, Kuala Lumpur, Malaysia, August 24-27, 2015, pp. 1-4, 2015, IEEE Computer Society, 978-1-4673-6537-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Win-Bin Huang, Wei-Tsung Su, Chiang-Sheng Liang |
A threshold-based key generation approach for ciphertext-policy attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUFN ![In: Seventh International Conference on Ubiquitous and Future Networks, ICUFN 2015, Sapporo, Japan, July 7-10, 2015, pp. 908-913, 2015, IEEE, 978-1-4799-8993-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu |
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers, pp. 585-589, 2015, Springer, 978-3-319-28864-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Xing Zhang 0002, Cancan Jin, Cong Li, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu |
Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers, pp. 500-518, 2015, Springer, 978-3-319-28864-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Benjamin Wesolowski, Pascal Junod |
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers, pp. 53-68, 2015, Springer, 978-3-319-30839-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Yutaka Kawai |
Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Proceedings, pp. 301-315, 2015, Springer, 978-3-319-17532-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Win-Bin Huang, Wei-Tsung Su |
Identity-based access control for digital content based on ciphertext-policy attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: 2015 International Conference on Information Networking, ICOIN 2015, Siem Reap, Cambodia, January 12-14, 2015, pp. 87-91, 2015, IEEE Computer Society, 978-1-4799-8342-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei |
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, pp. 270-289, 2015, Springer, 978-3-319-24176-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Hao Wang 0007, Bo Yang, Yilei Wang |
Server Aided Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, AINA 2015 Workshops, Gwangju, South Korea, March 24-27, 2015, pp. 440-444, 2015, IEEE Computer Society, 978-1-4799-1775-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Yongtao Wang |
Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 16(6), pp. 444-451, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
21 | Ximeng Liu, Jianfeng Ma 0001, Jinbo Xiong, Guangjun Liu |
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 16(6), pp. 437-443, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
21 | Hua Deng, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Lei Zhang 0009, Jianwei Liu 0001, Wenchang Shi |
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 275, pp. 370-384, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | A. Balu, Kuppusamy Krishnamoorthy |
An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 276, pp. 354-362, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | |
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 471, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
21 | Lequn Mo, Fuyong Lin |
A Dynamic Re-encrypted Ciphertext-Policy Attributed-Based Encryption Scheme for Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3PGCIC ![In: 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, November 8-10, 2014, pp. 14-19, 2014, IEEE Computer Society, 978-1-4799-4171-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo |
POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pp. 1490-1492, 2014, ACM, 978-1-4503-2957-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Changji Wang, Xi-Lei Xu, Yuan Li, Dong-Yuan Shi |
Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers, pp. 424-442, 2014, Springer, 978-3-319-16744-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Longhui Zu, Zhenhua Liu, Juanjuan Li |
New Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 14th IEEE International Conference on Computer and Information Technology, CIT 2014, Xi'an, China, September 11-13, 2014, pp. 281-287, 2014, IEEE Computer Society, 978-1-4799-6238-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Mukti Padhya, Devesh Jinwala |
A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings, pp. 167-184, 2014, Springer, 978-3-319-13840-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu 0002 |
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings, pp. 448-461, 2014, Springer, 978-3-319-06319-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Yinghui Zhang 0002, Dong Zheng 0001, Xiaofeng Chen 0001, Jin Li 0002, Hui Li 0006 |
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 259-273, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Jinguang Han, Willy Susilo, Yi Mu 0001, Jianying Zhou 0001, Man Ho Au |
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II, pp. 73-90, 2014, Springer, 978-3-319-11211-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, Xiaodong Lin 0001 |
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II, pp. 55-72, 2014, Springer, 978-3-319-11211-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Yuechen Chen, Zoe Lin Jiang, Siu-Ming Yiu, Joseph K. Liu, Man Ho Au, Xuan Wang 0002 |
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers, pp. 274-289, 2014, Springer, 978-3-319-21965-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Yong Cheng, Zhiying Wang 0003, Jun Ma 0015, Jiangjiang Wu, Songzhu Mei, Jiangchun Ren |
Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Zhejiang Univ. Sci. C ![In: J. Zhejiang Univ. Sci. C 14(2), pp. 85-97, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai 0001, Kazuo Ohta |
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1), pp. 53-67, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Xingxing Xie, Hua Ma, Jin Li 0002, Xiaofeng Chen 0001 |
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 19(16), pp. 2349-2367, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Junbeom Hur, Dongyoung Koo, Seong Oun Hwang, Kyungtae Kang |
Removing escrow from ciphertext policy attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Math. Appl. ![In: Comput. Math. Appl. 65(9), pp. 1310-1317, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Changji Wang, Xuan Liu, Wentao Li |
Design and implementation of a secure cloud-based personal health record system using ciphertext-policy attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Inf. Database Syst. ![In: Int. J. Intell. Inf. Database Syst. 7(5), pp. 389-399, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Zhen Liu 0008, Zhenfu Cao, Duncan S. Wong |
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 8(1), pp. 76-88, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Servos, Sabah Mohammed, Jinan Fiaidhi, Tai-Hoon Kim |
Extensions to ciphertext-policy attribute-based encryption to support distributed environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Appl. Technol. ![In: Int. J. Comput. Appl. Technol. 47(2/3), pp. 215-226, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Ling Yu, Bo Chen, Bei Huang, Ning Wang |
Context-Aware Access Control for Resources in the Ubiquitous Learning System Using Ciphertext-Policy Attribute-based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: 17th Pacific Asia Conference on Information Systems, PACIS 2013, Jeju Island, Korea, June 18-22, 2013, pp. 101, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
21 | Bo Lang, Runhua Xu, Yawei Duan |
Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013, pp. 147-157, 2013, SciTePress, 978-989-8565-73-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
21 | Changji Wang, Wentao Li, Yuan Li, Xi-Lei Xu |
A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSS ![In: Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings, pp. 377-386, 2013, Springer, 978-3-319-03583-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Junzuo Lai, Robert H. Deng, Yanjiang Yang, Jian Weng 0001 |
Adaptable Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers, pp. 199-214, 2013, Springer, 978-3-319-04872-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Y. Sreenivasa Rao, Ratna Dutta |
Recipient Anonymous Ciphertext-Policy Attribute Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings, pp. 329-344, 2013, Springer, 978-3-642-45203-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Y. Sreenivasa Rao, Ratna Dutta |
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings, pp. 66-81, 2013, Springer, 978-3-642-40778-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Takashi Kitagawa, Hiroki Kojima, Nuttapong Attrapadung, Hideki Imai |
Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 16th International Conference, ISC 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings, pp. 87-99, 2013, Springer, 978-3-319-27658-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | A. Balu, Kuppusamy Krishnamoorthy |
Ciphertext-Policy Attribute-Based Encryption with User Revocation Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSHINE ![In: Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers, pp. 696-705, 2013, Springer, 978-3-642-37948-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Ximeng Liu, Jianfeng Ma 0001, Jinbo Xiong, Qi Li 0011, Jun Ma |
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INCoS ![In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013, pp. 51-57, 2013, IEEE, 978-0-7695-4988-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Huiling Qian, Jiguo Li 0001, Yichen Zhang 0003 |
Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings, pp. 363-372, 2013, Springer, 978-3-319-02725-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Xingxing Xie, Hua Ma, Jin Li 0002, Xiaofeng Chen 0001 |
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT-EurAsia ![In: Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings, pp. 373-382, 2013, Springer, 978-3-642-36817-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Junbeom Hur, Chanil Park, Seongoun Hwang |
Fine-grained user access control in ciphertext-policy attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 5(3), pp. 253-261, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Zhen Liu 0008, Zhenfu Cao, Duncan S. Wong |
Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 669, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
21 | Jiang Zhang 0001, Zhenfeng Zhang, Aijun Ge 0001 |
Ciphertext policy attribute-based encryption from lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 16-17, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Suhair Alshehri, Stanislaw P. Radziszowski, Rajendra K. Raj |
Secure Access for Healthcare Data in the Cloud Using Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, ICDE 2012, Arlington, VA, USA, April 1-5, 2012, pp. 143-146, 2012, IEEE Computer Society, 978-1-4673-1640-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Frederic Nzanywayingoma, Qiming Huang |
Securable Personal Health Records using ciphertext policy attribute based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Healthcom ![In: IEEE 14th International Conference on e-Health Networking, Applications and Services, Healthcom 2012, Beijing, China, October 10-13, 2012, pp. 502-505, 2012, IEEE, 978-1-4577-2039-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Aijun Ge 0001, Rui Zhang 0002, Cheng Chen, Chuangui Ma, Zhenfeng Zhang |
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 336-349, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Kohei Kasamatsu, Takahiro Matsuda 0002, Goichiro Hanaoka, Hideki Imai |
Ciphertext Policy Multi-dimensional Range Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers, pp. 247-261, 2012, Springer, 978-3-642-37681-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Changji Wang, Xuan Liu, Wentao Li |
Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INCoS ![In: 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012, pp. 8-14, 2012, IEEE, 978-1-4673-2279-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Minda Yu, Qiuliang Xu |
A Simple and Effective Scheme of Ciphertext-Policy ABE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Eighth International Conference on Computational Intelligence and Security, CIS 2012, Guangzhou, China, November 17-18, 2012, pp. 516-519, 2012, IEEE Computer Society, 978-1-4673-4725-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Jin Li 0002, Qiong Huang 0001, Xiaofeng Chen 0001, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie |
Multi-authority ciphertext-policy attribute-based encryption with accountability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011, pp. 386-390, 2011, ACM, 978-1-4503-0564-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Jiang Zhang 0001, Zhenfeng Zhang |
A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers, pp. 324-340, 2011, Springer, 978-3-642-34703-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Muhammad Asim 0007, Luan Ibraimi, Milan Petkovic |
Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings, pp. 244-246, 2011, Springer, 978-3-642-24711-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Brent Waters |
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings, pp. 53-70, 2011, Springer, 978-3-642-19378-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai 0001, Kazuo Ohta |
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings, pp. 190-209, 2011, Springer, 978-3-642-25515-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Zhen Liu 0008, Zhenfu Cao, Qiong Huang 0001, Duncan S. Wong, Tsz Hon Yuen |
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, pp. 278-297, 2011, Springer, 978-3-642-23821-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|