-
1
-
-
84876013879
-
IHEMS: An information-centric approach to secure home energy management
-
J. Zhang, Q. Li, and E. M. Schooler, "iHEMS: An Information-Centric Approach to Secure Home Energy Management," in Proc. of IEEE SmartGridComm, 2012.
-
(2012)
Proc. of IEEE SmartGridComm
-
-
Zhang, J.1
Li, Q.2
Schooler, E.M.3
-
2
-
-
84883668982
-
Toward content-centric privacy in icn: Attribute-based encryption and routing
-
M. Ion, J. Zhang, and E. M. Schooler, "Toward content-centric privacy in icn: Attribute-based encryption and routing," in Proc. 3rd ACM SIGCOMM Workshop on ICN, ICN '13, pp. 39-40, 2013.
-
(2013)
Proc. 3rd ACM SIGCOMM Workshop on ICN, ICN '13
, pp. 39-40
-
-
Ion, M.1
Zhang, J.2
Schooler, E.M.3
-
4
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. of ACM CCS, pp. 89-98, 2006.
-
(2006)
Proc. of ACM CCS
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
5
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. of IEEE SP, pp. 321-334, 2007.
-
(2007)
Proc. of IEEE SP
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
6
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing," in Proc. of IEEE INFOCOM, pp. 1-9, 2010.
-
(2010)
Proc. of IEEE INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
7
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. of ACM CCS, pp. 735-737, 2010.
-
(2010)
Proc. of ACM CCS
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
8
-
-
84872006849
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
Springer
-
M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in Security and Privacy in Communication Networks, pp. 89-106, Springer, 2010.
-
(2010)
Security and Privacy in Communication Networks
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
9
-
-
84863392301
-
Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
-
Z. Wan, J. Liu, and R. H. Deng, "Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 743-754, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
12
-
-
84906997304
-
-
PhD thesis, University of Trento
-
M. Ion, Security of Publish/Subscribe Systems. PhD thesis, University of Trento, 2013. http://eprints-phd.biblio.unitn.it/993/.
-
(2013)
Security of Publish/Subscribe Systems
-
-
Ion, M.1
-
14
-
-
77953904148
-
Recommendation for key management-part 1: General (revision 3)
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for key management-part 1: General (revision 3)," NIST special publication, vol. 800, p. 57, 2011.
-
(2011)
NIST Special Publication
, vol.800
, pp. 57
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
15
-
-
79952498606
-
On the security of 1024-bit rsa and 160-bit elliptic curve cryptography
-
J. W. Bos, M. E. Kaihara, T. Kleinjung, A. K. Lenstra, and P. L. Montgomery, "On the security of 1024-bit rsa and 160-bit elliptic curve cryptography.," IACR Cryptology ePrint Archive, p. 389, 2009.
-
(2009)
IACR Cryptology EPrint Archive
, pp. 389
-
-
Bos, J.W.1
Kaihara, M.E.2
Kleinjung, T.3
Lenstra, A.K.4
Montgomery, P.L.5
-
17
-
-
85076484262
-
Outsourcing the decryption of abe ciphertexts
-
M. Green, S. Hohenberger, and B. Waters, "Outsourcing the decryption of abe ciphertexts.," in Proc. of USENIX Security, p. 3, 2011.
-
(2011)
Proc. of USENIX Security
, pp. 3
-
-
Green, M.1
Hohenberger, S.2
Waters, B.3
-
18
-
-
84868320122
-
Outsourcing encryption of attributebased encryption with mapreduce
-
Springer
-
J. Li, C. Jia, J. Li, and X. Chen, "Outsourcing encryption of attributebased encryption with mapreduce," in Information and Communications Security, pp. 191-201, Springer, 2012.
-
(2012)
Information and Communications Security
, pp. 191-201
-
-
Li, J.1
Jia, C.2
Li, J.3
Chen, X.4
-
19
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
ACM
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. of ACM CCS, pp. 195-203, ACM, 2007.
-
(2007)
Proc. of ACM CCS
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
20
-
-
67049156803
-
Distributed attributebased encryption
-
Springer
-
S. Müller, S. Katzenbeisser, and C. Eckert, "Distributed attributebased encryption," in Information Security and Cryptology, pp. 20-36, Springer, 2009.
-
(2009)
Information Security and Cryptology
, pp. 20-36
-
-
Müller, S.1
Katzenbeisser, S.2
Eckert, C.3
-
21
-
-
70350635850
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
-
Springer
-
K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length," in Information Security Practice and Experience, pp. 13-23, Springer, 2009.
-
(2009)
Information Security Practice and Experience
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
22
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Springer
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Public Key Cryptography, pp. 53-70, Springer, 2011.
-
(2011)
Public Key Cryptography
, pp. 53-70
-
-
Waters, B.1
-
23
-
-
84881510395
-
A survey on attributebased encryption schemes of access control in cloud environments
-
C.-C. Lee, P.-S. Chung, and M.-S. Hwang, "A survey on attributebased encryption schemes of access control in cloud environments," International Journal of Network Security, vol. 15, pp. 231-240, 2013.
-
(2013)
International Journal of Network Security
, vol.15
, pp. 231-240
-
-
Lee, C.-C.1
Chung, P.-S.2
Hwang, M.-S.3
|