-
1
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
J S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Yu, J.S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
2
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
May
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Security and Privacy, 2007. SP '07. IEEE Symposium on. May 2007, pp. 321-334.
-
(2007)
Security and Privacy, 2007. SP '07. IEEE Symposium on
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
79959287901
-
Secure and quality of service assurance scheduling scheme for wban with application to ehealth
-
Cancun, Quintana-Roo, Mexico
-
M. Barua, M. S. Alam, X. Liang, and X. Shen, "Secure and quality of service assurance scheduling scheme for wban with application to ehealth," in Wi"reless Communications and Networking Conference (WCNC). 2011 IEEE, Cancun, Quintana-Roo, Mexico, 2011, pp. 1-5.
-
(2011)
Wi"reless Communications and Networking Conference (WCNC). 2011 IEEE
, pp. 1-5
-
-
Barua, M.1
Alam, M.S.2
Liang, X.3
Shen, X.4
-
4
-
-
84855669629
-
A secure handshake scheme with symptoms-matching for mhealthcare social network
-
R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mhealthcare social network," Mobile Networks and Applications, pp. 1-12, 2010.
-
(2010)
Mobile Networks and Applications
, pp. 1-12
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
5
-
-
79959305027
-
Patient self-controllable access policy on phi in ehealthcare systems
-
X. Liang, R. Lu, X. Lin, and X. S. Shen, "Patient self-controllable access policy on phi in ehealthcare systems," in AHIC 2010, Kitchener, Ontario, Canada, 2010, pp. 1-5.
-
(2010)
AHIC 2010, Kitchener, Ontario, Canada
, pp. 1-5
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.S.4
-
6
-
-
67349253018
-
Sage: A strong privacypreserving scheme against global eavesdropping for ehealth systems
-
May
-
X. Lin, R. Lu. X. Shen, Y. Nemoto, and N. Kato, "Sage: a strong privacypreserving scheme against global eavesdropping for ehealth systems," Selected Areas in Communications, IEEE Journal on, vol. 27, no. 4, pp. 365-378, May 2009.
-
(2009)
Selected Areas in Communications, IEEE Journal on
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu. Shen, X.R.2
Nemoto, Y.3
Kato, N.4
-
8
-
-
78249278133
-
Data-centric privacy protocol for intensive care grids," Information Technology in Biomedicine
-
J. Luna, M. Dikaiakos, M. Marazakis, and T. Kyprianou, "Data-centric privacy protocol for intensive care grids," Information Technology in Biomedicine. IEEE Transactions on, vol. 14, no. 6, pp. 1327-1337, 2010.
-
(2010)
IEEE Transactions on
, vol.14
, Issue.6
, pp. 1327-1337
-
-
Luna, J.1
Dikaiakos, M.2
Marazakis, M.3
Kyprianou, T.4
-
9
-
-
78249245445
-
Efficient sharing of secure cloud storage services
-
Q. Liu, G. Wang, and J. Wu, "Efficient sharing of secure cloud storage services," in Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, 29 2010.
-
(2010)
Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on
, vol.29
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
10
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
New York, NY. USA: ACM
-
v. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM conference on Computer and communications security, ser. CCS '06. New York, NY. USA: ACM, 2006, pp. 89-98.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, Ser. CCS '06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
11
-
-
77952407083
-
Provably secure and efficient bounded ciphertext policy attribute based encryption
-
New York, NY, USA: ACM
-
X. Liang, Z. Cao, H. Lin, and D. Xing, "Provably secure and efficient bounded ciphertext policy attribute based encryption," in Proceedings of the 4th International Symposium on Information. Computer; and Communications Security, ser. ASIACCS '09. New York, NY, USA: ACM, 2009, pp. 343-352.
-
(2009)
Proceedings of the 4th International Symposium on Information. Computer; and Communications Security, Ser. ASIACCS '09
, pp. 343-352
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Xing, D.4
-
13
-
-
84934300668
-
Computing cryptographic algorithms in portable and embedded devices
-
May
-
A. Ramachandran, Z. Zhou, and D. Huang, "Computing cryptographic algorithms in portable and embedded devices," in Portable Information Devices. 2007. PORTABLE07. IEEE International Conference on, May 2007, pp. 1-7.
-
(2007)
Portable Information Devices. 2007. PORTABLE07. IEEE International Conference on
, pp. 1-7
-
-
Ramachandran, A.1
Zhou, Z.2
Huang, D.3
-
14
-
-
33744913525
-
An efficient identity-based key exchange protocol with kgs forward secrecy for low-power devices
-
R. Zhu. G. Yang, and D. Wong. "An efficient identity-based key exchange protocol with kgs forward secrecy for low-power devices," Internet and Network Economics, vol. 3828. pp. 500-509, 2005.
-
(2005)
Internet and Network Economics
, vol.3828
, pp. 500-509
-
-
Zhu. Yang, G.R.1
Wong, D.2
|