-
2
-
-
84954294709
-
-
"Dropbox, " http: //dropbox. com.
-
-
-
-
3
-
-
77957936026
-
-
"Google app engine, " http: //code. google. com/appengine.
-
Google App Engine
-
-
-
4
-
-
84870639734
-
-
"Microsoft azure, " http: //microsoft. com/azure.
-
Microsoft Azure
-
-
-
5
-
-
77953310709
-
Achieving secure, scalable, and finegrained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, et al., "Achieving secure, scalable, and finegrained data access control in cloud computing, " in INFOCOM. IEEE, 2010, pp. 534-542.
-
(2010)
INFOCOM. IEEE
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
-
6
-
-
84904430840
-
Fine: A fine-grained privacy-preserving location-based service framework for mobile devices
-
J. Shao, R. Lu, and X. Lin, "Fine: A fine-grained privacy-preserving location-based service framework for mobile devices, " in INFOCOM. IEEE, 2014, pp. 244-252.
-
(2014)
INFOCOM. IEEE
, pp. 244-252
-
-
Shao, J.1
Lu, R.2
Lin, X.3
-
7
-
-
0027764777
-
A cryptographic file system for UNIX
-
M. Blaze, "A cryptographic file system for UNIX, " in CCS. ACM, 1993, pp. 9-16.
-
(1993)
CCS. ACM
, pp. 9-16
-
-
Blaze, M.1
-
8
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W. J. Bolosky, M. Castro, et al., "FARSITE: Federated, available, and reliable storage for an incompletely trusted environment, " in OSDI. USENIX, 2002, pp. 1-14
-
(2002)
OSDI. USENIX
, pp. 14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
-
11
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, et al., "Improved proxy re-encryption schemes with applications to secure distributed storage, " in NDSS. The Internet Society, 2005.
-
(2005)
NDSS. the Internet Society
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
-
12
-
-
34547273527
-
Attribute-based encryption for fine grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine grained access control of encrypted data, " in CCS. ACM 2006, pp. 89-98.
-
(2006)
CCS. ACM
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
13
-
-
84883281346
-
Improving security and efficiency in attribute-based data sharing
-
J. Hur, "Improving security and efficiency in attribute-based data sharing, " IEEE Transactions on Knowledge and Data Engineering. Vol. 25, No. 10, 2013, pp. 2271-2282.
-
(2013)
IEEE Transactions on Knowledge and Data Engineering.
, vol.25
, Issue.10
, pp. 2271-2282
-
-
Hur, J.1
-
15
-
-
84958540552
-
Online/offline attribute-based encryption
-
Springer
-
S. Hohenberger and B. Waters, "Online/offline attribute-based encryption, " in Public Key Cryptography, LNCS, vol. 8383. Springer, 2014, pp. 293-310.
-
(2014)
Public Key Cryptography, LNCS
, vol.8383
, pp. 293-310
-
-
Hohenberger, S.1
Waters, B.2
-
16
-
-
84889034631
-
Practical constructions and new proof methods for large universe attribute-based encryption
-
Y. Rouselakis and B. Waters, "Practical constructions and new proof methods for large universe attribute-based encryption, " in CCS. ACM, 2013, pp. 463-474.
-
(2013)
CCS. ACM
, pp. 463-474
-
-
Rouselakis, Y.1
Waters, B.2
-
17
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms. " IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
18
-
-
84954294711
-
-
http: //crypto. stanford. edu/pbc/.
-
-
-
-
19
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Springer
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography, " in EUROCRYPT, LNCS, vol. 1403. Springer, 1998, pp. 127-144.
-
(1998)
EUROCRYPT, LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
20
-
-
67650135696
-
Key-private proxy reencryption
-
Springer
-
G. Ateniese, K. Benson, and S. Hohenberger, "Key-private proxy reencryption, " in CT-RSA, LNCS, vol. 5473. Springer, 2009, pp. 279-294.
-
(2009)
CT-RSA, LNCS
, vol.5473
, pp. 279-294
-
-
Ateniese, G.1
Benson, K.2
Hohenberger, S.3
-
21
-
-
52149099038
-
Tracing malicious proxies in proxy reencryption
-
Springer
-
B. Libert and D. Vergnaud, "Tracing malicious proxies in proxy reencryption, " in Pairing, LNCS, vol. 5209. Springer, 2008, pp. 332-353.
-
(2008)
Pairing, LNCS
, vol.5209
, pp. 332-353
-
-
Libert, B.1
Vergnaud, D.2
-
22
-
-
79251541771
-
Sccr: A generic approach to simultaneously achieve cca security and collusion-resistance in proxy re-encryption
-
J. Shao, Z. Cao, and P. Liu, "Sccr: a generic approach to simultaneously achieve cca security and collusion-resistance in proxy re-encryption, " Security and Communication Networks, vol. 4, no. 2, pp. 122-135, 2011.
-
(2011)
Security and Communication Networks
, vol.4
, Issue.2
, pp. 122-135
-
-
Shao, J.1
Cao, Z.2
Liu, P.3
-
23
-
-
58549086614
-
Type-based proxy re-encryption and its construction
-
Q. Tang, "Type-based proxy re-encryption and its construction, " in INDOCRYPT, 2008, pp. 130-144.
-
(2008)
INDOCRYPT
, pp. 130-144
-
-
Tang, Q.1
-
24
-
-
77952362084
-
Attribute Based Proxy Reencryption with Delegating Capabilities
-
X. Liang, Z. Cao, H. Lin, and J. Shao, "Attribute Based Proxy Reencryption with Delegating Capabilities, " in ACM ASIACCS 2009, 2009, pp. 276-286.
-
(2009)
ACM ASIACCS 2009
, pp. 276-286
-
-
Liang, X.1
Cao, Z.2
Lin, H.3
Shao, J.4
|