-
1
-
-
0004200684
-
-
Air Force Electronic Systems Division, Report ESD-TR-73-51
-
J. Anderson. Computer Security Technology Planning Study. Air Force Electronic Systems Division, Report ESD-TR-73-51, 1972. http://seclab.cs. ucdavis.edu/projects/history/.
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.1
-
2
-
-
84888195437
-
Ciphertext-Policy Attribute-Based Encryption
-
J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-Policy Attribute-Based Encryption. In Proc. of SP'07, Washington, DC, USA, 2007.
-
Proc. of SP'07, Washington, DC, USA, 2007
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
22044446217
-
Divertible Protocols and Atomic Proxy Cryptography
-
M. Blaze, G. Bleumer, and M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. In Proc. of EUROCRYPT '98, Espoo, Finland, 1998.
-
Proc. of EUROCRYPT '98, Espoo, Finland, 1998
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
69949166012
-
Identity-based Encryption with Efficient Revocation
-
A. Boldyreva, V. Goyal, and V. Kumar. Identity-based Encryption with Efficient Revocation. In Proc. of CCS'08, Alexandria, Virginia, USA, 2008.
-
Proc. of CCS'08, Alexandria, Virginia, USA, 2008
-
-
Boldyreva, A.1
Goyal, V.2
Kumar, V.3
-
5
-
-
0012970453
-
Identity-Based Encryption from the Weil Pairing
-
D. Boneh and M. Franklin. Identity-Based Encryption from The Weil Pairing. In Proc. of CRYPTO'01, Santa Barbara, California, USA, 2001.
-
Proc. of CRYPTO'01, Santa Barbara, California, USA, 2001
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
80051874002
-
Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
-
S. Yu, K. Ren, W. Lou, and J. Li. Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems. In Proc. of Securecomm'09, Athens, Greece, 2009.
-
Proc. of Securecomm'09, Athens, Greece, 2009
-
-
Yu, S.1
Ren, K.2
Lou, W.3
Li, J.4
-
7
-
-
4944229353
-
Chosen Ciphertext Security from Identity Based Encryption
-
R. Canetti, S. Halevi, and J. Katz. Chosen Ciphertext Security from Identity Based Encryption. In Proc. of EUROCRYPT'04, Interlaken, Switzerland, 2004.
-
Proc. of EUROCRYPT'04, Interlaken, Switzerland, 2004
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
8
-
-
77952361637
-
Chosen-Ciphertext Secure Proxy Re-Encryption
-
R. Canetti and S. Hohenberger. Chosen-Ciphertext Secure Proxy Re-Encryption. In Proc. of CCS'07, New York, NY, USA, 2007.
-
Proc. of CCS'07, New York, NY, USA, 2007
-
-
Canetti, R.1
Hohenberger, S.2
-
9
-
-
45749116552
-
Provably Secure Ciphertext Policy ABE
-
L. Cheung and C. Newport. Provably Secure Ciphertext Policy ABE. In Proc. of CCS'07, New York, NY, USA, 2007.
-
Proc. of CCS'07, New York, NY, USA, 2007
-
-
Cheung, L.1
Newport, C.2
-
10
-
-
77954479142
-
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
-
R. H. Deng, J. Weng, S. Liu, and K. Chen. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In Proc. of CANS'08, Berlin, Heidelberg, 2008.
-
Proc. of CANS'08, Berlin, Heidelberg, 2008
-
-
Deng, R.H.1
Weng, J.2
Liu, S.3
Chen, K.4
-
11
-
-
85011043313
-
Over-encryption: Management of Access Control Evolution on Outsourced Data
-
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-encryption: Management of Access Control Evolution on Outsourced Data. In Proc. of VLDB'07, Vienna, Austria, 2007.
-
Proc. of VLDB'07, Vienna, Austria, 2007
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
12
-
-
34547273527
-
Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data. In Proc. of CCS'06, Alexandria, Virginia, USA, 2006.
-
Proc. of CCS'06, Alexandria, Virginia, USA, 2006
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
13
-
-
70349086608
-
Attribute-Based On-Demand Multicast Group Setup with Membership Anonymity
-
S. Yu, K. Ren, and W. Lou. Attribute-Based On-Demand Multicast Group Setup with Membership Anonymity. In Proc. of SecureComm'08, Istanbul, Turkey, 2008.
-
Proc. of SecureComm'08, Istanbul, Turkey, 2008
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
14
-
-
85033460636
-
Plutus: Scalable Secure File Sharing on Untrusted Storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable Secure File Sharing on Untrusted Storage. In Proc. of FAST'03, Berkeley, California, USA, 2003.
-
Proc. of FAST'03, Berkeley, California, USA, 2003
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
15
-
-
77954503700
-
Privacy-Aware Attribute-Based Encryption with User Accountability
-
J. Li, K. Ren, B. Zhu, and Z. Wan. Privacy-Aware Attribute-Based Encryption with User Accountability. In Proc. of ISC'09, Pisa, Italy, 2009.
-
Proc. of ISC'09, Pisa, Italy, 2009
-
-
Li, J.1
Ren, K.2
Zhu, B.3
Wan, Z.4
-
16
-
-
77952362084
-
Attribute Based Proxy Re-encryption with Delegating Capabilities
-
X. Liang, Z. Cao, H. Lin, and J. Shao. Attribute Based Proxy Re-encryption with Delegating Capabilities. In Proc. of ASIACCS'09, Sydney, Australia, 2009.
-
Proc. of ASIACCS'09, Sydney, Australia, 2009
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Shao, J.4
-
17
-
-
58049192731
-
Attribute-Based Content Distribution with Hidden Policy
-
S. Yu, K. Ren, and W. Lou. Attribute-Based Content Distribution with Hidden Policy. In Proc. of NPSEC'08, Orlando, Florida, USA, 2008.
-
Proc. of NPSEC'08, Orlando, Florida, USA, 2008
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
18
-
-
34547325357
-
Secure Atrribute-Based Systems
-
M. Pirretti, P. Traynor, P. McDaniel, and B. Waters. Secure Atrribute-Based Systems. In Proc. of CCS'06, New York, NY, USA, 2006.
-
Proc. of CCS'06, New York, NY, USA, 2006
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
|