-
1
-
-
72449201970
-
Attribute-based encryption supporting direct/indirect revocation modes
-
Parker, M.G. (ed.), Springer, Heidelberg, LNCS, vol. 5921
-
Attrapadung, N., Imai, H.: Attribute-based encryption supporting direct/indirect revocation modes. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol. 5921, pp. 278-300. Springer, Heidelberg (2009)
-
(2009)
Cryptography and Coding 2009
, pp. 278-300
-
-
Attrapadung, N.1
Imai, H.2
-
2
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K. (ed.), Springer, Heidelberg, LNCS, vol. 1403
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
EUROCRYPT 1998
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
3
-
-
85084163661
-
A method for fast revocation of public key certificates and security capabilities
-
Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: A method for fast revocation of public key certificates and security capabilities. In: Proceedings of USENIX Security (2001)
-
(2001)
Proceedings of USENIX Security
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
Wong, C.M.4
-
4
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S&P, pp. 321-334 (2007)
-
(2007)
Proceedings of IEEE S&P
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
84961584112
-
Legal issues in the cloud
-
Choo, K.K.R.: Legal issues in the cloud. IEEE Cloud Comput. 1(1), 94-96 (2014)
-
(2014)
IEEE Cloud Comput
, vol.1
, Issue.1
, pp. 94-96
-
-
Choo, K.K.R.1
-
6
-
-
33745818483
-
Security-mediated certificateless cryptography
-
Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.), Springer, Heidelberg, LNCS, vol. 3958
-
Chow, S.S.M., Boyd, C., González Nieto, J.M.: Security-mediated certificateless cryptography. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 508-524. Springer, Heidelberg (2006)
-
(2006)
PKC 2006
, pp. 508-524
-
-
Chow, S.S.M.1
Boyd, C.2
González Nieto, J.M.3
-
7
-
-
84991821017
-
Fully-RCCA-CCA-Secure ciphertext-policy attribute based encryption with security mediator
-
Chen, Y., Jiang, L., Yiu, S., Au, M., Xuan, W.: Fully-RCCA-CCA-Secure ciphertext-policy attribute based encryption with security mediator. In: Proceedings of ICICS 2014 (2014)
-
(2014)
Proceedings of ICICS 2014
-
-
Chen, Y.1
Jiang, L.2
Yiu, S.3
Au, M.4
Xuan, W.5
-
9
-
-
84887920404
-
Security concerns in popular cloud storage services
-
Chu, C.-K., Zhu, W.T., Han, J., Liu, J.K., Xu, J., Zhou, J.: Security concerns in popular cloud storage services. IEEE Pervasive Comput. 12(4), 50-57 (2013)
-
(2013)
IEEE Pervasive Comput
, vol.12
, Issue.4
, pp. 50-57
-
-
Chu, C.-K.1
Zhu, W.T.2
Han, J.3
Liu, J.K.4
Xu, J.5
Zhou, J.6
-
10
-
-
78649245892
-
-
European Network and Information Security Agency: Cloud computing risk assessment (2009). http://www.enisa.europa.eu/act/rm/files/deliverables/ cloud-computing-risk-assessment
-
(2009)
Cloud computing risk assessment
-
-
-
13
-
-
34547273527
-
Attribute-based encryption for finegrained access control of encrypted data
-
Goyal, V., Pandy, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Proceedings of ACM CCS 2006, pp. 89-98 (2006)
-
(2006)
Proceedings of ACM CCS 2006
, pp. 89-98
-
-
Goyal, V.1
Pandy, O.2
Sahai, A.3
Waters, B.4
-
14
-
-
84958540552
-
Online/offline attribute-based encryption
-
Krawczyk, H. (ed.), Springer, Heidelberg, LNCS, vol. 8383
-
Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293-310. Springer, Heidelberg (2014)
-
(2014)
PKC 2014
, pp. 293-310
-
-
Hohenberger, S.1
Waters, B.2
-
15
-
-
84901649741
-
TIMER: Secure and reliable cloud storage against data re-outsourcing
-
Huang, X., Zhou, J. (eds.), Springer, Heidelberg, LNCS, vol. 8434
-
Jiang, T., Chen, X., Li, J., Wong, D.S., Ma, J., Liu, J.: TIMER: secure and reliable cloud storage against data re-outsourcing. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 346-358. Springer, Heidelberg (2014)
-
(2014)
ISPEC 2014
, pp. 346-358
-
-
Jiang, T.1
Chen, X.2
Li, J.3
Wong, D.S.4
Ma, J.5
Liu, J.6
-
16
-
-
84907468655
-
A DFA-based functional proxy pe-encryption scheme for secure public cloud data sharing
-
Liang, K., Au, M.H., Liu, J.K., Susilo, W., Wong, D.S., Yang, G., Phuong, T.V.X., Xie, Q.: A DFA-based functional proxy pe-encryption scheme for secure public cloud data sharing. IEEE Trans. Inf. Forensics Secur. 9(10), 1667-1680 (2014)
-
(2014)
IEEE Trans. Inf. Forensics Secur
, vol.9
, Issue.10
, pp. 1667-1680
-
-
Liang, K.1
Au, M.H.2
Liu, J.K.3
Susilo, W.4
Wong, D.S.5
Yang, G.6
Phuong, T.V.X.7
Xie, Q.8
-
17
-
-
84906492583
-
GO-ABE: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
-
Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: GO-ABE: an efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Proceedings of ESORICS 2014, pp. 257-272 (2014)
-
(2014)
Proceedings of ESORICS 2014
, pp. 257-272
-
-
Liang, K.1
Liu, J.K.2
Wong, D.S.3
Susilo, W.4
-
18
-
-
84933040096
-
Privacy-preserving ciphertext multi-sharing control for big data storage
-
Liang, K., Susilo, W., Liu, J.K.: Privacy-preserving ciphertext multi-sharing control for big data storage. IEEE Trans. Inf. Forensics Secur. 10(8), 1578-1589 (2015)
-
(2015)
IEEE Trans. Inf. Forensics Secur
, vol.10
, Issue.8
, pp. 1578-1589
-
-
Liang, K.1
Susilo, W.2
Liu, J.K.3
-
19
-
-
84926642709
-
Secure sharing and searching for real-time video data in mobile cloud
-
Liu, J.K., Au, M.H., Susilo, W., Liang, K., Lu, R., Srinivasan, B.: Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2), 46-50 (2015)
-
(2015)
IEEE Netw
, vol.29
, Issue.2
, pp. 46-50
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
Liang, K.4
Lu, R.5
Srinivasan, B.6
-
20
-
-
84908672589
-
GO-ABE: Group-oriented attribute-based encryption
-
Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.), Springer, Heidelberg, LNCS, vol. 8792
-
Li, M., Huang, X., Liu, J.K., Xu, L.: GO-ABE: group-oriented attribute-based encryption. In: Au, M.H., Carminati, B., Kuo, C.-C.J. (eds.) NSS 2014. LNCS, vol. 8792, pp. 260-270. Springer, Heidelberg (2014)
-
(2014)
NSS 2014
, pp. 260-270
-
-
Li, M.1
Huang, X.2
Liu, J.K.3
Xu, L.4
-
22
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Kilian, J. (ed.), Springer, Heidelberg, LNCS, vol. 2139
-
Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
23
-
-
74049120601
-
Attribute-based encryption with nonmonotonic access structures
-
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with nonmonotonic access structures. In: Proceedings of ACM CCS 2007, pp. 195-203 (2007)
-
(2007)
Proceedings of ACM CCS 2007
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
24
-
-
84902429611
-
-
Syngress/Elsevier, Amsterdam
-
Quick, D., Martini, B., Choo, K.K.R.: Cloud Storage Forensics. Syngress/Elsevier, Amsterdam (2014)
-
(2014)
Cloud Storage Forensics
-
-
Quick, D.1
Martini, B.2
Choo, K.K.R.3
-
25
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Fumy, W. (ed.), Springer, Heidelberg, LNCS, vol. 1233
-
Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
-
(1997)
EUROCRYPT 1997
, pp. 256-266
-
-
Shoup, V.1
-
26
-
-
84865465739
-
Dynamic credentials and ciphertext delegation for attribute-based encryption
-
Safavi-Naini, R., Canetti, R. (eds.), Springer, Heidelberg, LNCS, vol. 7417
-
Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012)
-
(2012)
CRYPTO 2012
, pp. 199-217
-
-
Sahai, A.1
Seyalioglu, H.2
Waters, B.3
-
27
-
-
84976779342
-
Fast probabilistic algorithms for verification of polynomial identities
-
Schwartz, J.T.: Fast probabilistic algorithms for verification of polynomial identities. J. ACM 27(4), 701-717 (1980)
-
(1980)
J. ACM
, vol.27
, Issue.4
, pp. 701-717
-
-
Schwartz, J.T.1
-
28
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg, LNCS, vol. 6571
-
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
-
(2011)
PKC 2011
, pp. 53-70
-
-
Waters, B.1
-
29
-
-
78649998200
-
Hierarhical attribute-based encryption for fine-grained access control in cloud storage services
-
Wang, G., Liu, Q., Wu, J.: Hierarhical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of ACM CCS 2010, pp. 735-737 (2010)
-
(2010)
Proceedings of ACM CCS 2010
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
30
-
-
84903121888
-
Expressive, efficient, and revocable data access control for multiauthority cloud storage
-
Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multiauthority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735-1744 (2014)
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.7
, pp. 1735-1744
-
-
Yang, K.1
Jia, X.2
-
31
-
-
84886903289
-
DAC-MACS: Effective data access control for multiauthority cloud storage systems
-
Yang, K., Jia, X., Ren, K., Zhang, B., Xie, R.: DAC-MACS: effective data access control for multiauthority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790-1801 (2013)
-
(2013)
IEEE Trans. Inf. Forensics Secur
, vol.8
, Issue.11
, pp. 1790-1801
-
-
Yang, K.1
Jia, X.2
Ren, K.3
Zhang, B.4
Xie, R.5
-
32
-
-
84951742592
-
Achieving revocable fine-grained cryptographic access control over cloud data
-
Yang, Y., Ding, X., Lu, H., Wan, Z., Zhou, J.: Achieving revocable fine-grained cryptographic access control over cloud data. In: Proceedings of ISC 2013 (2013)
-
(2013)
Proceedings of ISC 2013
-
-
Yang, Y.1
Ding, X.2
Lu, H.3
Wan, Z.4
Zhou, J.5
-
33
-
-
84910007051
-
Fine-grained conditional proxy re-encryption and application
-
Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.), Springer, Heidelberg. Extended version to appear: Pervasive and Mobile Computing, ELSEVIER, LNCS, vol. 8782
-
Yang, Y., Lu, H., Weng, J., Zhang, Y., Sakurai, K.: Fine-grained conditional proxy re-encryption and application. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 206-222. Springer, Heidelberg (2014). Extended version to appear: Pervasive and Mobile Computing, ELSEVIER
-
(2014)
ProvSec 2014
, pp. 206-222
-
-
Yang, Y.1
Lu, H.2
Weng, J.3
Zhang, Y.4
Sakurai, K.5
-
34
-
-
77953310709
-
Achieving secure, scalable, and fine-grained aata access control in cloud computing
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained aata access control in cloud computing. In: Proceedings of IEEE INFOCOM 2010 (2010)
-
(2010)
Proceedings of IEEE INFOCOM 2010
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
35
-
-
84906492508
-
Identity-based encryption with postchallenge auxiliary inputs for secure cloud applications and sensor networks
-
Kuty_lowski, M., Vaidya, J. (eds.), Springer, Heidelberg, LNCS, vol. 8712
-
Yuen, T.H., Zhang, Y., Yiu, S.M., Liu, J.K.: Identity-based encryption with postchallenge auxiliary inputs for secure cloud applications and sensor networks. In: Kuty_lowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 130-147. Springer, Heidelberg (2014)
-
(2014)
ICAIS 2014, Part I
, pp. 130-147
-
-
Yuen, T.H.1
Zhang, Y.2
Yiu, S.M.3
Liu, J.K.4
-
36
-
-
84925463455
-
Probabilistic algorithms for sparse polynomials
-
Ng, K.W. (ed.), Springer, Heidelberg, LNCS, vol. 72
-
Zippel, R.: Probabilistic algorithms for sparse polynomials. In: Ng, K.W. (ed.) EUROSAM/ISSAC 1979. LNCS, vol. 72, pp. 216-226. Springer, Heidelberg (1979)
-
(1979)
EUROSAM/ISSAC 1979
, pp. 216-226
-
-
Zippel, R.1
|