메뉴 건너뛰기




Volumn 61, Issue 3, 2015, Pages 328-335

Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption

Author keywords

attribute based encryption; integrated broadcast broadband service; privacy preserving; viewing history

Indexed keywords

CRYPTOGRAPHY; INFORMATION DISSEMINATION;

EID: 84945130222     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2015.7298092     Document Type: Article
Times cited : (10)

References (22)
  • 5
    • 84936077777 scopus 로고    scopus 로고
    • Privacy Preserving System for Integrated Broadcast-broadband Services
    • Las Vegas, USA Jan
    • G. Ohtake, and K. Ogawa, "Privacy Preserving System for Integrated Broadcast-broadband Services," in Proc. IEEE International Conference on Consumer Electronics, Las Vegas, USA, pp. 306-307, Jan. 2015.
    • (2015) Proc. IEEE International Conference on Consumer Electronics , pp. 306-307
    • Ohtake, G.1    Ogawa, K.2
  • 6
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Denmark May
    • A. Sahai, and B. Waters, "Fuzzy identity-based encryption," in Proc. Eurocrypt, Aarhus, Denmark, pp. 457-473, May. 2005.
    • (2005) Proc. Eurocrypt, Aarhus , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 11
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • Istanbul, Turkey Apr
    • J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in Proc. Eurocrypt, Istanbul, Turkey, pp. 146-162, Apr. 2008.
    • (2008) Proc. Eurocrypt , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 14
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • Monaco, France May
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. Eurocrypt, Monaco, France, pp. 62-91, May. 2010.
    • (2010) Proc. Eurocrypt , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 15
    • 77957011503 scopus 로고    scopus 로고
    • Fully secure functional encryption with general relations from the decisional linear assumption
    • Santa Barbara, USA Aug
    • T. Okamoto, and K. Takashima, "Fully secure functional encryption with general relations from the decisional linear assumption," in Proc. Crypto, Santa Barbara, USA, pp. 191-208, Aug. 2010.
    • (2010) Proc. Crypto , pp. 191-208
    • Okamoto, T.1    Takashima, K.2
  • 16
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Taormina, Italy Mar
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Proc. International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, pp. 53-70. Mar. 2011.
    • (2011) Proc. International Conference on Practice and Theory in Public Key Cryptography , pp. 53-70
    • Waters, B.1
  • 18
    • 84945148327 scopus 로고    scopus 로고
    • JIPDEC JIPDEC, Japan, Apr in Japanese
    • JIPDEC, "The PrivacyMark System," JIPDEC, Japan, Apr. 2014. (in Japanese)
    • (2014) The PrivacyMark System
  • 19
    • 84945148328 scopus 로고    scopus 로고
    • CryptoJS: JavaScript Implementations of Standard and Secure Cryptographic Algorithms (online)
    • Jan
    • J. Mott, "CryptoJS: JavaScript Implementations of Standard and Secure Cryptographic Algorithms (online)," Jeff Mott, Jan. 2013.
    • (2013) Jeff Mott
    • Mott, J.1
  • 22
    • 19944413957 scopus 로고    scopus 로고
    • Fingerprinting Relational Databases: Schemes and Specialties
    • Jan -Mar
    • Y. Li, V. Swarup, and S. Jajodia, "Fingerprinting Relational Databases: Schemes and Specialties," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.
    • (2005) IEEE Trans. Dependable and Secure Computing , vol.2 , Issue.1 , pp. 34-45
    • Li, Y.1    Swarup, V.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.