-
3
-
-
84874108742
-
-
Microsoft
-
Microsoft, Microsoft's azure. < http://www.microsoft.com/windowsazure/ >.
-
Microsoft's Azure
-
-
-
4
-
-
35048901123
-
Public key encryption with keyword search
-
C. Cachin, J. Camenisch, Springer Berlin/Heidelberg doi
-
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano Public key encryption with keyword search C. Cachin, J. Camenisch, Advances in Cryptology, EUROCRYPT 2004 vol. 3027 2004 Springer Berlin/Heidelberg 506 522 doi: http://dx.doi.org/10.1007/978-3-540-24676-3-30
-
(2004)
Advances in Cryptology, EUROCRYPT 2004
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
33748485156
-
Attribute-based access control with hidden policies and hidden credentials
-
K. Frikken, M. Atallah, and J. Li Attribute-based access control with hidden policies and hidden credentials IEEE Trans Comput 55 2006 1259 1270
-
(2006)
IEEE Trans Comput
, vol.55
, pp. 1259-1270
-
-
Frikken, K.1
Atallah, M.2
Li, J.3
-
8
-
-
58049192731
-
Attribute-based content distribution with hidden policy
-
doi: http://dx.doi.org/10.1109/NPSection2008.4664879 NPSection 2008
-
Yu S, Ren K, Lou W. Attribute-based content distribution with hidden policy. In: 4th Workshop on secure network protocols, 2008. NPSection 2008; 2008. p. 39-44. doi: http://dx.doi.org/10.1109/NPSection2008.4664879.
-
(2008)
4th Workshop on Secure Network Protocols, 2008
, pp. 39-44
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
9
-
-
45749094622
-
Attribute-based encryption with partially hidden encryptor-specified access structures
-
S. Bellovin, R. Gennaro, A. Keromytis, M. Yung, Springer Berlin/Heidelberg doi
-
T. Nishide, K. Yoneyama, and K. Ohta Attribute-based encryption with partially hidden encryptor-specified access structures S. Bellovin, R. Gennaro, A. Keromytis, M. Yung, Applied cryptography and network security vol. 5037 2008 Springer Berlin/Heidelberg 111 129 doi: http://dx.doi.org/10.1007/978-3-540- 68914-0-7
-
(2008)
Applied Cryptography and Network Security
, vol.5037
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
10
-
-
74249119947
-
Extended attribute based encryption for private information retrieval
-
doi: http://dx.doi.org/10.1109/MOBHOC.2009.5336932 doi: http://dx.doi.org/10.1109/MOBHOC.2009.5336932
-
Yinan S, Cao Z. Extended attribute based encryption for private information retrieval. In: IEEE 6th international conference on mobile ad hoc and sensor systems, 2009. MASS '09; 2009. p. 702-707. doi: http://dx.doi.org/10. 1109/MOBHOC.2009.5336932.
-
(2009)
IEEE 6th International Conference on Mobile Ad Hoc and Sensor Systems, 2009. MASS '09
, pp. 702-707
-
-
Yinan, S.1
Cao, Z.2
-
11
-
-
54249101916
-
Public key encryption with keyword search revisited
-
O. Gervasi, B. Murgante, A. Lagana, D. Taniar, Y. Mun, M. Gavrilova, Springer Berlin/Heidelberg doi
-
J. Baek, R. Safavi-Naini, and W. Susilo Public key encryption with keyword search revisited O. Gervasi, B. Murgante, A. Lagana, D. Taniar, Y. Mun, M. Gavrilova, Computational science and its applications, ICCSA 2008, vol. 5072 2008 Springer Berlin/Heidelberg 1249 1259 doi: http://dx.doi.org/10.1007/978-3- 540-69839-5-96
-
(2008)
Computational Science and Its Applications, ICCSA 2008
, vol.5072
, pp. 1249-1259
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
12
-
-
80052684081
-
New efficient searchable encryption schemes from bilinear pairings
-
C. Gu, and Y. Zhu New efficient searchable encryption schemes from bilinear pairings Int J Network Secur 10 2010 25 31
-
(2010)
Int J Network Secur
, vol.10
, pp. 25-31
-
-
Gu, C.1
Zhu, Y.2
-
13
-
-
33749573228
-
Anonymous hierarchical identity-based encryption (without random oracles)
-
C. Dwork, Springer Berlin/Heidelberg doi
-
X. Boyen, and B. Waters Anonymous hierarchical identity-based encryption (without random oracles) C. Dwork, Advances in cryptology-CRYPTO 2006 vol. 4117 2006 Springer Berlin/Heidelberg 290 307 doi: http://dx.doi.org/10.1007/11818175- 17
-
(2006)
Advances in Cryptology-CRYPTO 2006
, vol.4117
, pp. 290-307
-
-
Boyen, X.1
Waters, B.2
-
14
-
-
79959265831
-
Shared and searchable encrypted data for untrusted servers
-
C. Dong, G. Russello, and N. Dulay Shared and searchable encrypted data for untrusted servers J Computer Secur 19 3 2011 367 397
-
(2011)
J Computer Secur
, vol.19
, Issue.3
, pp. 367-397
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
15
-
-
77949657618
-
Providing data confidentiality against malicious hosts in shared data spaces
-
doi: http://dx.doi.org/10.1016/j.scico.2009.07.011 [10th international conference on coordination models and languages, COORD 08]
-
Russello G, Dong C, Dulay N, Chaudron M, van Steen M. Providing data confidentiality against malicious hosts in shared data spaces. Sci Comput Programming 2010;75(6):426-39, [10th international conference on coordination models and languages, COORD 08] doi: http://dx.doi.org/10.1016/j.scico.2009.07. 011.
-
(2010)
Sci Comput Programming
, vol.75
, Issue.6
, pp. 426-439
-
-
Russello, G.1
Dong, C.2
Dulay, N.3
Chaudron, M.4
Van Steen, M.5
-
16
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
doi: http://dx.doi.org/10.1007/978-3-540-70936-7-29 S. Vadhan, Springer Berlin/Heidelberg
-
D. Boneh, and B. Waters Conjunctive, subset, and range queries on encrypted data S. Vadhan, Theory of cryptography vol. 4392 2007 Springer Berlin/Heidelberg 535 554 doi: http://dx.doi.org/10.1007/978-3-540-70936-7-29
-
(2007)
Theory of Cryptography
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
17
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Springer-Verlag Berlin, Heidelberg
-
J. Katz, A. Sahai, and B. Waters Predicate encryption supporting disjunctions, polynomial equations, and inner products Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, EUROCRYPT'08 2008 Springer-Verlag Berlin, Heidelberg 146 162
-
(2008)
Proceedings of the Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology, EUROCRYPT'08
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
18
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
doi: http://dx.doi.org/10.1007/978-3-642-13190-5-4 H. Gilbert, Springer Berlin/Heidelberg
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption H. Gilbert, Advances in Cryptology, EUROCRYPT 2010 vol. 6110 2010 Springer Berlin/Heidelberg 62 91 doi: http://dx.doi.org/10.1007/978-3-642- 13190-5-4
-
(2010)
Advances in Cryptology, EUROCRYPT 2010
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
19
-
-
84555209972
-
Ensuring anonymity for LBSs in smartphone environment
-
10.3745/JIPS.2011.7.1.121
-
M. Alizaabi, C.Y. Yeun, and T.A. Martin Ensuring anonymity for LBSs in smartphone environment J Inf Process Syst 7 1 2011 121 136 10.3745/JIPS.2011.7. 1.121
-
(2011)
J Inf Process Syst
, vol.7
, Issue.1
, pp. 121-136
-
-
Alizaabi, M.1
Yeun, C.Y.2
Martin, T.A.3
-
20
-
-
80051973199
-
Selection of model in developing information security criteria for smart grid security system. Parallel and Distributed Processing with Applications Workshops (ISPAW)
-
doi: http://dx.doi.org/10.1109/ISPAW.2011.12
-
Ling APA, Masao M. Selection of model in developing information security criteria for smart grid security system. Parallel and Distributed Processing with Applications Workshops (ISPAW), 2011 Ninth IEEE International Symposium on, p. 91-8. doi: http://dx.doi.org/10.1109/ISPAW.2011.12.
-
2011 Ninth IEEE International Symposium on
, pp. 91-98
-
-
Apa, L.1
Masao, M.2
-
21
-
-
84255215444
-
On secure communication in integrated heterogeneous wireless networks
-
10.1504/IJITCC.2010.035224
-
B. Xie, A. Kumar, D. Zhao, R. Reddy, and B. He On secure communication in integrated heterogeneous wireless networks Int J Inf Technol Commun Convergence, IJITCC 1 1 2010 4 23 10.1504/IJITCC.2010.035224
-
(2010)
Int J Inf Technol Commun Convergence, IJITCC
, vol.1
, Issue.1
, pp. 4-23
-
-
Xie, B.1
Kumar, A.2
Zhao, D.3
Reddy, R.4
He, B.5
-
22
-
-
84866787448
-
Dynamic load balancing and network adaptive virtual storage service for mobile appliances
-
10.3745/JIPS.2011.7.1.053
-
I. Ong, and H. Lim Dynamic load balancing and network adaptive virtual storage service for mobile appliances J Inf Process Syst 7 1 2011 53 62 10.3745/JIPS.2011.7.1.053
-
(2011)
J Inf Process Syst
, vol.7
, Issue.1
, pp. 53-62
-
-
Ong, I.1
Lim, H.2
-
24
-
-
77649269780
-
Highly available intrusion-tolerant services with proactive-reactive recovery
-
P. Sousa, A.N. Bessani, M. Correia, N.F. Neves, and P. Verissimo Highly available intrusion-tolerant services with proactive-reactive recovery IEEE Trans Parallel Distrib Syst 21 4 2010 452 465
-
(2010)
IEEE Trans Parallel Distrib Syst
, vol.21
, Issue.4
, pp. 452-465
-
-
Sousa, P.1
Bessani, A.N.2
Correia, M.3
Neves, N.F.4
Verissimo, P.5
-
25
-
-
33645998872
-
Fuzzy identity-based encryption
-
doi: http://dx.doi.org/10.1007/11426639-27 R. Cramer, Springer Berlin/Heidelberg
-
A. Sahai, and B. Waters Fuzzy identity-based encryption R. Cramer, Advances in cryptology, EUROCRYPT 2005 vol. 3494 2005 Springer Berlin/Heidelberg p. 557-57. doi: http://dx.doi.org/10.1007/11426639-27
-
(2005)
Advances in Cryptology, EUROCRYPT 2005
, vol.3494
, pp. 557-657
-
-
Sahai, A.1
Waters, B.2
-
26
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
doi: http://doi.acm.org/10.1145/1180405.1180418 ACM New York, NY, USA
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters Attribute-based encryption for fine-grained access control of encrypted data Proceedings of the 13th ACM conference on Computer and communications security, CCS '06 2006 ACM New York, NY, USA 89 98 doi: http://doi.acm.org/10.1145/1180405.1180418
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS '06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
28
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
doi: http://dx.doi.org/10.1007/978-3-642-19379-8-4 D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, Springer Berlin/Heidelberg
-
B. Waters Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, Public Key Cryptography, PKC 2011 vol. 6571 2011 Springer Berlin/Heidelberg 53 70 doi: http://dx.doi.org/10.1007/978-3-642-19379-8-4
-
(2011)
Public Key Cryptography, PKC 2011
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
29
-
-
45749116552
-
Provably secure ciphertext policy abe
-
doi: http://doi.acm.org/10.1145/1315245.1315302 ACM New York, NY, USA
-
L. Cheung, and C. Newport Provably secure ciphertext policy abe Proceedings of the 14th ACM conference on Computer and communications security, CCS '07 2007 ACM New York, NY, USA 456 465 doi: http://doi.acm.org/10.1145/ 1315245.1315302
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
31
-
-
84858132835
-
Hierarchical key derivation scheme for group-oriented communication systems
-
10.1504/IJITCC.2010.035227
-
S.-J. Wang, Y.-R. Tsai, C.-C. Shen, and P.-Y. Chen Hierarchical key derivation scheme for group-oriented communication systems Int J Inf Technol Commun Convergence, IJITCC 1 1 2011 66 76 10.1504/IJITCC.2010.035227
-
(2011)
Int J Inf Technol Commun Convergence, IJITCC
, vol.1
, Issue.1
, pp. 66-76
-
-
Wang, S.-J.1
Tsai, Y.-R.2
Shen, C.-C.3
Chen, P.-Y.4
-
32
-
-
38149092452
-
Pairing-based onion routing
-
doi: http://dx.doi.org/10.1007/978-3-540-75551-7-7 N. Borisov, P. Golle, Springer Berlin/Heidelberg
-
A. Kate, G. Zaverucha, and I. Goldberg Pairing-based onion routing N. Borisov, P. Golle, Privacy enhancing technologies vol. 4776 2007 Springer Berlin/Heidelberg 95 112 doi: http://dx.doi.org/10.1007/978-3-540-75551-7-7
-
(2007)
Privacy Enhancing Technologies
, vol.4776
, pp. 95-112
-
-
Kate, A.1
Zaverucha, G.2
Goldberg, I.3
-
33
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
doi: http://dx.doi.org/10.1007/3-540-44647-8-13 J. Kilian, Springer Berlin/Heidelberg
-
D. Boneh, and M. Franklin Identity-based encryption from the weil pairing J. Kilian, Advances in cryptology, CRYPTO 2001 vol. 2139 2001 Springer Berlin/Heidelberg 213 229 doi: http://dx.doi.org/10.1007/3-540-44647-8-13
-
(2001)
Advances in Cryptology, CRYPTO 2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
|