-
2
-
-
84976664565
-
A method for obtaining digital signatures and public-key cryptosystems
-
Jan.
-
R.L. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 26, no. 1, pp. 96-99, Jan. 1983.
-
(1983)
Comm ACM
, vol.26
, Issue.1
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
3
-
-
84877730481
-
Energy consumption in mobile phones: A measurement study and implications for network applications
-
N. Balasubramanian, A. Balasubramanian, A. Venkataramani, "Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications," Proc. Ninth ACM SIGCOMM Conf. Internet Measurement Conf. (IMC '09), pp. 280-293, 2009.
-
(2009)
Proc. Ninth ACM SIGCOMM Conf. Internet Measurement Conf. (IMC '09)
, pp. 280-293
-
-
Balasubramanian, N.1
Balasubramanian, A.2
Venkataramani, A.3
-
4
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, B. Waters, "Ciphertext-Policy Attribute-Based Encryption," Proc. IEEE Symp. Security and Privacy (SP '07), pp. 321-334, 2007.
-
(2007)
Proc IEEE Symp. Security and Privacy (SP '07)
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
6
-
-
79957599737
-
-
Technical Report BBCR, Univ. of Waterloo
-
X. Liang, R. Lu, X. Lin, "Ciphertext Policy Attribute Based Encryption with Efficient Revocation," Technical Report BBCR, Univ. of Waterloo, 2011.
-
(2011)
Ciphertext Policy Attribute Based Encryption with Efficient Revocation
-
-
Liang, X.1
Lu, R.2
Lin, X.3
-
7
-
-
79957585981
-
Attribute-based access control with efficient revocation in data outsourcing systems
-
July
-
J. Hur and D.K. Noh, "Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.
-
(2011)
IEEE Trans. Parallel and Distributed Systems
, vol.22
, Issue.7
, pp. 1214-1221
-
-
Hur, J.1
Noh, D.K.2
-
8
-
-
79952398762
-
Trusted data sharing over untrusted cloud storage providers
-
G. Zhao, C. Rong, J. Li, F. Zhang, Y. Tang, "Trusted Data Sharing over Untrusted Cloud Storage Providers," Proc. IEEE Second Int'l Conf. Cloud Computing Technology and Science (CLOUDCOM '10), pp. 97-103, 2010.
-
(2010)
Proc IEEE Second Int'l Conf. Cloud Computing Technology and Science (CLOUDCOM '10)
, pp. 97-103
-
-
Zhao, G.1
Rong, C.2
Li, J.3
Zhang, F.4
Tang, Y.5
-
10
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Feb.
-
G. Ateniese, K. Fu, M. Green, S. Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," ACM Trans. Information and System Security, vol. 9, pp. 1-30, Feb. 2006.
-
(2006)
ACM Trans. Information and System Security
, vol.9
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
11
-
-
79956030125
-
EASiER: Encryption-based access control in social networks with efficient revocation
-
S. Jahid, P. Mittal, N. Borisov, "EASiER: Encryption-Based Access Control in Social Networks with Efficient Revocation," Proc. Sixth ACM Symp. Information, Computer and Comm. Security (ASIACCS '11), pp. 411-415, 2011.
-
(2011)
Proc. Sixth ACM Symp. Information, Computer and Comm. Security (ASIACCS '11)
, pp. 411-415
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
12
-
-
84871153743
-
Clock-based proxy re-encryption scheme in unreliable clouds
-
Sept.
-
Q. Liu, G. Wang, J. Wu, "Clock-Based Proxy Re-Encryption Scheme in Unreliable Clouds," Proc. 41st Int'l Conf. Parallel Processing Workshops (ICPPW), pp. 304-305, Sept. 2012.
-
(2012)
Proc. 41st Int'l Conf. Parallel Processing Workshops (ICPPW)
, pp. 304-305
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
13
-
-
80051653580
-
Attribute based proxy re-encryption for data confidentiality in cloud computing environments
-
May
-
J.-M. Do, Y.-J. Song, N. Park, "Attribute Based Proxy Re-Encryption for Data Confidentiality in Cloud Computing Environments," Proc. First ACIS/JNU Int'l Conf. Computers, Networks, Systems and Industrial Eng. (CNSI), pp. 248-251, May 2011.
-
(2011)
Proc. First ACIS/JNU Int'l Conf. Computers, Networks, Systems and Industrial Eng. (CNSI)
, pp. 248-251
-
-
Do, J.-M.1
Song, Y.-J.2
Park, N.3
-
14
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang, K. Ren, W. Lou, "Attribute Based Data Sharing with Attribute Revocation," Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS '10), pp. 261-270, 2010.
-
(2010)
Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS '10)
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
15
-
-
84860617727
-
An efficient attribute based encryption scheme with revocation for outsourced data sharing control
-
Y. Ming, L. Fan, H. Jing-Li, W. Zhao-Li, "An Efficient Attribute Based Encryption Scheme with Revocation for Outsourced Data Sharing Control," Proc. First Int'l Conf. Instrumentation, Measurement, Computer, Comm. and Control, pp. 516-520, 2011.
-
(2011)
Proc. First Int'l Conf. Instrumentation, Measurement, Computer, Comm. and Control
, pp. 516-520
-
-
Ming, Y.1
Fan, L.2
Jing-Li, H.3
Zhao-Li, W.4
-
16
-
-
77953310709
-
Achieving secure, scalable, fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, W. Lou, "Achieving Secure, Scalable, Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM '10, pp. 534-542, 2010.
-
(2010)
Proc IEEE INFOCOM '10
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
18
-
-
84883076035
-
DAC-MACS: Effective data access control for multi-authority cloud storage systems
-
K. Yang, X. Jia, K. Ren, B. Zhang, "DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems," Proc. IEEE INFOCOM, pp. 2895-2903, 2013.
-
(2013)
Proc IEEE INFOCOM
, pp. 2895-2903
-
-
Yang, K.1
Jia, X.2
Ren, K.3
Zhang, B.4
-
23
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
G. Wang, Q. Liu, J. Wu, "Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services," Proc. 17th ACM Conf. Computer and Comm. Security (CCS '10), pp. 735-737, 2010.
-
(2010)
Proc. 17th ACM Conf. Computer and Comm. Security (CCS '10)
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
|