Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing (Q2292920): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(6 intermediate revisions by 5 users not shown)
Property / author
 
Property / author: Ying-Hui Zhang / rank
Normal rank
 
Property / author
 
Property / author: Ying-Hui Zhang / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ins.2016.04.015 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2345068994 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q115042068 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An expressive and provably secure ciphertext-policy attribute-based encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conjunctive, Subset, and Range Queries on Encrypted Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-authority Attribute Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure integration of asymmetric and symmetric encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant Size Ciphertexts in Threshold Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Encryption with Fast Decryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Cipertext-Policy Hiding CP-ABE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decentralizing Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy-Aware Attribute-Based Encryption with User Accountability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 16:41, 21 July 2024

scientific article
Language Label Description Also known as
English
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
scientific article

    Statements

    Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    6 February 2020
    0 references
    cloud computing
    0 references
    attribute-based encryption
    0 references
    privacy protection
    0 references
    anonymity
    0 references
    fast decryption
    0 references
    0 references

    Identifiers