-
1
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
Kallahalla, M., Riedel, E., Swaminathan, R.,Wang, Q., Fu, K.: Plutus: Scalable Secure File Sharing on Untrusted Storage. In: Proc. USENIX Conf. File and Storage Technologies, pp. 29-42 (2003)
-
(2003)
Proc. USENIX Conf. File and Storage Technologies
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
2
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In: Proc. Network and Distributed Systems Security Symp (NDSS), pp. 29-43 (2005)
-
(2005)
Proc. Network and Distributed Systems Security Symp (NDSS)
, pp. 29-43
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. In: Proc. IEEE INFOCOM, pp. 534-542 (2010)
-
(2010)
Proc. IEEE INFOCOM
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
4
-
-
84884802064
-
Fine-grained access control based on outsourced attribute-based encryption
-
Crampton, J., Jajodia, S., Mayes, K. (eds.) LNCS, Springer, Heidelberg
-
Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained Access Control based on Outsourced Attribute-based Encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 592-609. Springer, Heidelberg (2013)
-
(2013)
Esorics 2013
, vol.8134
, pp. 592-609
-
-
Li, J.1
Chen, X.2
Li, J.3
Jia, C.4
Ma, J.5
Lou, W.6
-
5
-
-
84901595577
-
Digital provenance enabling secure data forensics in cloud computing
-
Li, J., Chen, X., Huang, Q., Wong, D.S.: Digital Provenance Enabling Secure Data Forensics in Cloud Computing. In: Future Generation Computer Systems. Elsevier (2013), http://dx.doi.org/10.1016/j.future.2013.10.006
-
(2013)
Future Generation Computer Systems. Elsevier
-
-
Li, J.1
Chen, X.2
Huang, Q.3
Wong, D.S.4
-
6
-
-
84877786210
-
Mona: Secure multi-owner data sharing for dynamic groups in the cloud
-
Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Transactions on Parallel and Distributed Systems 24(6), 1182-1191 (2013)
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.6
, pp. 1182-1191
-
-
Liu, X.1
Zhang, Y.2
Wang, B.3
Yan, J.4
-
7
-
-
84891807562
-
Key-aggregate cryptosystem for scalable data sharing in cloud storage
-
Chu, C., Chow, S., Tzeng, W., et al.: Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. IEEE Transactions on Parallel and Distributed Systems 25(2), 468-477 (2014)
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, Issue.2
, pp. 468-477
-
-
Chu, C.1
Chow, S.2
Tzeng, W.3
-
8
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
IEEE Press
-
Song, X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44-55. IEEE Press (2000)
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, X.1
Wagner, D.2
Perrig, A.3
-
9
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
ACM Press
-
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on Computer and Communications Security, pp. 79-88. ACM Press (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
10
-
-
84869394463
-
Dynamic searchable symmetric encryption
-
ACM
-
Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS), pp. 965-976. ACM (2012)
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security (CCS)
, pp. 965-976
-
-
Kamara, S.1
Papamanthou, C.2
Roeder, T.3
-
11
-
-
35048901123
-
Public key encryption with keyword search
-
Cachin, C., Camenisch, J.L. (eds.) LNCS, Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506-522. Springer, Heidelberg (2004)
-
(2004)
Eurocrypt 2004
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
12
-
-
50049095455
-
Public key encryption with conjunctive keyword search and its extension to a multi-user system
-
Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) LNCS, Springer, Heidelberg
-
Hwang, Y.-H., Lee, P.J.: Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2-22. Springer, Heidelberg (2007)
-
(2007)
Pairing 2007
, vol.4575
, pp. 2-22
-
-
Hwang, Y.-H.1
Lee, P.J.2
-
13
-
-
84887939181
-
Efficient multi-user keyword search over encrypted data in cloud computing
-
Li, J., Chen, X.: Efficient Multi-user Keyword Search Over Encrypted Data in Cloud Computing. Computing and Informatics 32(4), 723-738 (2013)
-
(2013)
Computing and Informatics
, vol.32
, Issue.4
, pp. 723-738
-
-
Li, J.1
Chen, X.2
-
14
-
-
77953308681
-
Fuzzy keyword search over encrypted data in cloud computing
-
Li, J., Wang, Q., Wang, C.: Fuzzy keyword search over encrypted data in cloud computing. In: Proc. IEEE INFOCOM, pp. 1-5 (2010)
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-5
-
-
Li, J.1
Wang, Q.2
Wang, C.3
-
15
-
-
80052760893
-
Conjunctive wildcard search over encrypted data
-
Jonker, W., Petkovíc, M. (eds.) LNCS, Springer, Heidelberg
-
Bösch, C., Brinkman, R., Hartel, P., Jonker, W.: Conjunctive wildcard search over encrypted data. In: Jonker, W., Petkovíc, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 114-127. Springer, Heidelberg (2011)
-
(2011)
SDM 2011
, vol.6933
, pp. 114-127
-
-
Bösch, C.1
Brinkman, R.2
Hartel, P.3
Jonker, W.4
-
16
-
-
84864659703
-
Multi-user keyword search scheme for secure data sharing with fine-grained access control
-
Kim, H. (ed.) LNCS, Springer, Heidelberg
-
Zhao, F., Nishide, T., Sakurai, K.: Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 406-418. Springer, Heidelberg (2012)
-
(2012)
ICISC 2011
, vol.7259
, pp. 406-418
-
-
Zhao, F.1
Nishide, T.2
Sakurai, K.3
-
17
-
-
84889573613
-
Multi-user searchable encryption with coarser- grained access control in hybrid cloud
-
IEEE
-
Liu, Z.,Wang, Z., Cheng, X., et al.: Multi-user Searchable Encryption with Coarser- Grained Access Control in Hybrid Cloud. In: Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), pp. 249-255. IEEE (2013)
-
(2013)
Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
, pp. 249-255
-
-
Liu, Z.1
Wang, Z.2
Cheng, X.3
-
18
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proc. IEEE INFOCOM, pp. 525-533 (2010)
-
(2010)
Proc. IEEE INFOCOM
, pp. 525-533
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
19
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Shoup, V. (ed.) LNCS, Springer, Heidelberg
-
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
-
(2005)
Crypto 2005
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
20
-
-
84880174080
-
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
-
Phan, D.H., Pointcheval, D., Shahandashti, S.F., et al.: Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. International Journal of Information Security 12(4), 251-265 (2013)
-
(2013)
International Journal of Information Security
, vol.12
, Issue.4
, pp. 251-265
-
-
Phan, D.H.1
Pointcheval, D.2
Shahandashti, S.F.3
-
21
-
-
84946840347
-
Short signatures from the Weil pairing
-
Boyd, C. (ed.) LNCS, Springer, Heidelberg
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
-
(2001)
Asiacrypt 2001
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
22
-
-
46749097974
-
Tinytate: Computing the tate pairing in resource-constrained sensor nodes
-
Oliveira, L.B., Aranha, D.F., Morais, E., et al.: Tinytate: Computing the tate pairing in resource-constrained sensor nodes. In: IEEE Sixth IEEE International Symposium on Network Computing and Applications, pp. 318-323 (2007)
-
(2007)
IEEE Sixth IEEE International Symposium on Network Computing and Applications
, pp. 318-323
-
-
Oliveira, L.B.1
Aranha, D.F.2
Morais, E.3
-
23
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
Li, M., Lou,W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wireless Communications 17(1), 51-58 (2010)
-
(2010)
IEEE Wireless Communications
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
|