-
1
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
volume 2139 of LNCS
-
D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. In Proceedings of CRYPTO 2001, volume 2139 of LNCS, pages 213-229.
-
Proceedings of CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
volume 2332 of LNCS
-
J. Horwitz and B. Lynn. Toward hierarchical identity-based encryption. In Proceedings of EUROCRYPT 2002, volume 2332 of LNCS, pages 466- 481.
-
Proceedings of EUROCRYPT 2002
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
4
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
volume 3494 of LNCS
-
D. Boneh, X. Boyen, and E. Goh. Hierarchical identity based encryption with constant size ciphertext. In Proceedings of EUROCRYPT 2005, volume 3494 of LNCS, pages 440-456.
-
Proceedings of EUROCRYPT 2005
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
5
-
-
35048841300
-
Efficient selective-id secure identity based encryption without random oracles
-
volume 3027 of LNCS
-
D. Boneh and X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In Proceedings of EUROCRYPT 2004, volume 3027 of LNCS, pages 223-38.
-
Proceedings of EUROCRYPT 2004
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
70350663051
-
Hierarchical identity base encryption with polynomially many levels
-
volume 5444 of LNCS
-
C. Gentry and S. Halevi. Hierarchical identity base encryption with polynomially many levels. In Proceedings of TCC 2009, volume 5444 of LNCS, pages.437-456.
-
Proceedings of TCC 2009
, pp. 437-456
-
-
Gentry, C.1
Halevi, S.2
-
7
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
volume 5677 of LNCS
-
B. Waters. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In Proceedings of CRYPTO 2009, volume 5677 of LNCS, pages 619-636.
-
Proceedings of CRYPTO 2009
, pp. 619-636
-
-
Waters, B.1
-
9
-
-
49149119622
-
Computing in the clouds
-
Dec.
-
A. Weiss. Computing in the clouds. netWorker, 11(4): 16-25, Dec. 2007.
-
(2007)
NetWorker
, vol.11
, Issue.4
, pp. 16-25
-
-
Weiss, A.1
-
11
-
-
56349150824
-
Market-oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities
-
R. Buyya, C. S. Yeo, and S. Venugopal. Market-oriented cloud computing: vision, hype, and reality for delivering IT services as computing utilities. In Proceedings of IEEE HPCC 2008, pages 5-13.
-
Proceedings of IEEE HPCC 2008
, pp. 5-13
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
-
12
-
-
51949087262
-
Cloud computing-issues, research and implementations
-
M. A. Vouk. Cloud computing-issues, research and implementations. In Proceedings of ITI 2008, pages 31-40.
-
Proceedings of ITI 2008
, pp. 31-40
-
-
Vouk, M.A.1
-
13
-
-
70749116607
-
An efficient privacy preserving keyword search scheme in cloud computing
-
Q. Liu, G. Wang and J. Wu. An efficient privacy preserving keyword search scheme in cloud computing. In Proceedings of IEEE CSE 2009/TrustCom 2009, pages 715-720.
-
Proceedings of IEEE CSE 2009/TrustCom 2009
, pp. 715-720
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
14
-
-
24944554962
-
Fuzzy identity-based encryption
-
volume 3494 of LNCS
-
A. Sahai and B. Waters. Fuzzy identity-based encryption. In Proceedings of EUROCRYPT 2005, volume 3494 of LNCS, pages 457-473.
-
Proceedings of EUROCRYPT 2005
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
17
-
-
38049078557
-
Multi-authority attribute based encryption
-
volume 4392 of LNCS
-
M. Chase. Multi-authority attribute based encryption. In Proceedings of TCC 2007, volume 4392 of LNCS, pages 515-534.
-
Proceedings of TCC 2007
, pp. 515-534
-
-
Chase, M.1
-
18
-
-
74049163235
-
Improving privacy and security in multiauthority attribute-based encryption
-
M. Chase and S. Chow. Improving privacy and security in multiauthority attribute-based encryption. In Proceedings of ACM CCS 2009, pages 121-130.
-
Proceedings of ACM CCS 2009
, pp. 121-130
-
-
Chase, M.1
Chow, S.2
-
19
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing. In Proceedings of IEEE INFOCOM 2010, pages 15-19.
-
Proceedings of IEEE INFOCOM 2010
, pp. 15-19
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
20
-
-
70349682512
-
FDAC: Toward fine-grained distributed data access control in wireless sensor networks
-
S. Yu, K. Ren, and W. Lou. FDAC: Toward fine-grained distributed data access control in wireless sensor networks. In Proceedings of IEEE INFOCOM 2009, pages 19-25.
-
Proceedings of IEEE INFOCOM 2009
, pp. 19-25
-
-
Yu, S.1
Ren, K.2
Lou, W.3
|