-
1
-
-
84866627419
-
Fog Computing and its Role in the Internet of Things
-
Helsinki, Finland, 17-17 August
-
Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog Computing and its Role in the Internet of Things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing, Helsinki, Finland, 17-17 August 2012; pp. 13-16.
-
(2012)
Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
2
-
-
84912130127
-
The Fog computing paradigm: Scenarios and security issues
-
Warsaw, Poland, 7-10 September
-
Stojmenovic, I.; Wen, S. The Fog computing paradigm: Scenarios and security issues. In Proceedings of the Federated Conference on Computer Science and Information Systems, Warsaw, Poland, 7-10 September 2014; pp. 1-8.
-
(2014)
Proceedings of the Federated Conference on Computer Science and Information Systems
, pp. 1-8
-
-
Stojmenovic, I.1
Wen, S.2
-
3
-
-
84951050684
-
Survey of Fog Computing: Concepts, Applications and Issues
-
Hangzhou, China, 21-21 June
-
Yi, S.; Li, C.; Li, Q. A Survey of Fog Computing: Concepts, Applications and Issues. In Mobidata’15 Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou, China, 21-21 June 2015; pp. 37-42, doi:10.1145/2757384.2757397.
-
(2015)
Mobidata’15 Proceedings of the 2015 Workshop on Mobile Big Data
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.A.3
-
4
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Alexandria, VA, USA, 30 October-3 November
-
Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October-3 November 2006; pp. 89-98.
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security, CCS 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
5
-
-
34548731375
-
Ciphertext-Policy Attribute-Based Encryption
-
Berkeley, CA, USA, 20-23 May
-
Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-Policy Attribute-Based Encryption. In Procededings of the IEEE Symposium on Security and Privacy, 2007, Berkeley, CA, USA, 20-23 May 2007; pp. 321-334.
-
(2007)
Procededings of the IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
6
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
Li, M.; Yu, S.; Zheng, Y.; Ren, K.; Lou, W. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems 2013, 24(1), 131-143.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
7
-
-
85029576091
-
With outsourced decryption for fog computing
-
Zuo, C.; Shao, J.; Wei, G.; Xie, M.; Ji, M. CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 2016, doi:10.1016/j.future.2016.10.028.
-
(2016)
Future Gener. Comput. Syst
-
-
Zuo, C.1
Shao, J.2
Wei, G.3
Xie, M.4
Ji, M.5
Cca-Secure, A.6
-
8
-
-
85011878988
-
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
-
Jiang, Y.; Susilo, W.; Mu, Y.; Guo, F. Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 2017, doi:10.1016/j.future.2017.01.026.
-
(2017)
Future Gener. Comput. Syst
-
-
Jiang, Y.1
Susilo, W.2
Mu, Y.3
Guo, F.4
-
9
-
-
85011802339
-
Towards leakage-resilient fine-grained access control in fog computing
-
Yu, Z.; Man, H.A.; Xu, Q.; Yang, R.; Han, J. Towards leakage-resilient fine-grained access control in fog computing. Future Gener. Comput. Syst. 2017, doi:10.1016/j.future.2017.01.025.
-
(2017)
Future Gener. Comput. Syst
-
-
Yu, Z.1
Man, H.A.2
Xu, Q.3
Yang, R.4
Han, J.5
-
10
-
-
85009274837
-
An efficient access control scheme with outsourcing capability and attribute update for fog computing
-
Zhang, P.; Chen, Z.; Liu, J.K.; Liang, K.; Liu, H. An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 2016, doi:10.1016/j.future.2016.12.015.
-
(2016)
Future Gener. Comput. Syst
-
-
Zhang, P.1
Chen, Z.2
Liu, J.K.3
Liang, K.4
Liu, H.5
-
11
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Berkeley, CA, USA, 14-17 May
-
Song, D.X.; Wagner, D.; Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the IEEE Symposium on Security & Privacy, Berkeley, CA, USA, 14-17 May 2000; pp. 44-55.
-
(2000)
Proceedings of the IEEE Symposium on Security & Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
12
-
-
84907448566
-
Survey of Provably Secure Searchable Encryption
-
Bosch, C.; Hartel, P.; Jonker, W.; Peter, A. A Survey of Provably Secure Searchable Encryption. ACM Comput. Surv. (CSUR) 2015, 47, 1-51.
-
(2015)
ACM Comput. Surv. (CSUR)
, vol.47
, pp. 1-51
-
-
Bosch, C.1
Hartel, P.2
Jonker, W.3
Peter, A.A.4
-
13
-
-
26444507272
-
Privacy Preserving Keyword Searches on Remote Encrypted Data
-
LNCS, Springer Berlin/Heidelberg, Germany, 7-10 June
-
Chang, Y.C.; Mitzenmacher, M. Privacy Preserving Keyword Searches on Remote Encrypted Data. In Proceedings of the Applied Cryptography and Network Security, ANCS 2005, LNCS, Springer Berlin/Heidelberg, Germany, 7-10 June 2005; pp. 442-455.
-
(2005)
Proceedings of the Applied Cryptography and Network Security, ANCS 2005
, pp. 442-455
-
-
Chang, Y.C.1
Mitzenmacher, M.2
-
14
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Curtmola, R.; Garay, J.; Kamara, S.; Ostrovsky, R. Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 2011, 19, 79-88.
-
(2011)
J. Comput. Secur
, vol.19
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
15
-
-
84863181194
-
Multi-user private keyword search for cloud computing
-
Athens, Greece, 29 November-1 December
-
Yang, Y.; Lu, H.; Weng, J. Multi-user private keyword search for cloud computing. In Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom), Athens, Greece, 29 November-1 December 2011; pp. 264-271.
-
(2011)
Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science (Cloudcom)
, pp. 264-271
-
-
Yang, Y.1
Lu, H.2
Weng, J.3
-
16
-
-
84904444112
-
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
-
Toronto, ON, Canada, 27 April-2 May
-
Sun, W.H.; Yu, S.C.; Lou, W.J.; Hou, Y.T.; Li, H. Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In Proceedings of the INFOCOM, Toronto, ON, Canada, 27 April-2 May 2014; Volume 27, pp. 226-234.
-
(2014)
Proceedings of the INFOCOM
, vol.27
, pp. 226-234
-
-
Sun, W.H.1
Yu, S.C.2
Lou, W.J.3
Hou, Y.T.4
Li, H.5
-
17
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Springer: Heidelberg, Germany
-
Dan, B.; Crescenzo, G.D.; Ostrovsky, R.; Persiano, G. Public Key Encryption with Keyword Search. In Advances in Cryptology-EUROCRYPT 2004; Springer: Heidelberg, Germany, 2003; pp. 506-522.
-
(2003)
Advances in Cryptology-Eurocrypt 2004
, pp. 506-522
-
-
Dan, B.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
18
-
-
33750246968
-
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
-
Springer: Heidelberg, Germany
-
Baek, J.; Safavi-Naini, R.; Susilo, W. On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. In Information Security; Springer: Heidelberg, Germany, 2006; Volume 4176, pp. 217-232.
-
(2006)
Information Security
, vol.4176
, pp. 217-232
-
-
Baek, J.1
Safavi-Naini, R.2
Susilo, W.3
-
19
-
-
84938701752
-
Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage
-
Liang, K.; Susilo, W. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1981-1992.
-
(2015)
IEEE Trans. Inf. Forensics Secur
, vol.10
, pp. 1981-1992
-
-
Liang, K.1
Susilo, W.2
-
20
-
-
85003936025
-
On the Feasibility of Attribute-Based Encryption on Internet of Things Devices
-
Ambrosin, M.; Anzanpour, A.; Conti, M.; Dargahi, T.; Moosavi, S.R.; Rahmani, A.M.; Liljeberg, P. On the Feasibility of Attribute-Based Encryption on Internet of Things Devices. IEEE Micro 2016, 36, 25-35.
-
(2016)
IEEE Micro
, vol.36
, pp. 25-35
-
-
Ambrosin, M.1
Anzanpour, A.2
Conti, M.3
Dargahi, T.4
Moosavi, S.R.5
Rahmani, A.M.6
Liljeberg, P.7
-
21
-
-
85076484262
-
Outsourcing the decryption of ABE ciphertexts
-
Berkeley, CA, USA
-
Green, M.; Hohenberger, S.; Waters, B. Outsourcing the decryption of ABE ciphertexts. In Usenix Conference on Security; USENIX Association: Berkeley, CA, USA, 2011; Volume 49, pp. 34-34.
-
(2011)
Usenix Conference on Security; USENIX Association
, vol.49
, pp. 34
-
-
Green, M.1
Hohenberger, S.2
Waters, B.3
-
22
-
-
84884802064
-
Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption
-
Li, J.; Chen, X.; Li, J.; Jia, C.; Ma, J.; Lou, W. Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption. Comput. Secur. Esorics 2013, 8134, 592-609.
-
(2013)
Comput. Secur. Esorics
, vol.8134
, pp. 592-609
-
-
Li, J.1
Chen, X.2
Li, J.3
Jia, C.4
Ma, J.5
Lou, W.6
-
23
-
-
84958540552
-
Online/offline attribute-based encryption
-
Springer: Heidelberg, Germany
-
Hohenberger, S.; Waters, B. Online/offline attribute-based encryption. In Public-Key Cryptography, PKC; Springer: Heidelberg, Germany, 2014; Volume 8383, pp. 293-310.
-
(2014)
Public-Key Cryptography, PKC
, vol.8383
, pp. 293-310
-
-
Hohenberger, S.1
Waters, B.2
-
24
-
-
76649143738
-
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
-
Springer: Heidelberg, Germany
-
Luan, I.; Petkovic, M.; Nikova, S.; Hartel, P.; Jonker, W. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In Information Security Applications; Springer: Heidelberg, Germany, 2009; Volume 5932, pp. 309-323.
-
(2009)
Information Security Applications
, vol.5932
, pp. 309-323
-
-
Luan, I.1
Petkovic, M.2
Nikova, S.3
Hartel, P.4
Jonker, W.5
-
25
-
-
24944554962
-
Fuzzy Identity-Based Encryption
-
Sahai, A.; Waters, B. Fuzzy Identity-Based Encryption. Lect. Notes Comput. Sci. 2004, 3494, 457-473.
-
(2004)
Lect. Notes Comput. Sci
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
26
-
-
45749116552
-
Provably secure ciphertext policy ABE
-
Alexandria, VA, USA, 29 October-2 November
-
Cheung, L.; Newport, C. Provably secure ciphertext policy ABE. In Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October-2 November 2007; Volume 2007, pp. 456-465.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security
, vol.2007
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
27
-
-
34547325357
-
Secure attribute-based systems
-
Alexandria, VA, USA, 30 October-3 November
-
Pirretti, M.; Traynor, P.; Mcdaniel, P.; Waters, B. Secure attribute-based systems. In Proceedings of the ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October-3 November 2006; Volume 18, pp. 99-112.
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security, CCS 2006
, vol.18
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
McDaniel, P.3
Waters, B.4
-
28
-
-
84877948269
-
Attribute-based fine-grained access control with efficient revocation in cloud storage systems
-
Hangzhou, China, 8-10 May
-
Yang, K.; Jia, X.; Ren, K. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In Proceedings of the ACM Sigsac Symposium on Information, Computer and Communications Security, Hangzhou, China, 8-10 May 2013; pp. 523-528.
-
(2013)
Proceedings of the ACM Sigsac Symposium on Information, Computer and Communications Security
, pp. 523-528
-
-
Yang, K.1
Jia, X.2
Ren, K.3
-
29
-
-
84969915329
-
Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds
-
Tysowski, P.K.; Hasan, M.A. Hybrid attribute-and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE Trans. Cloud Comput. 2013, 1, 172-186.
-
(2013)
IEEE Trans. Cloud Comput
, vol.1
, pp. 172-186
-
-
Tysowski, P.K.1
Hasan, M.A.2
-
30
-
-
38349070353
-
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
-
Springer: Heidelberg, Germany
-
Zhang, R.; Imai, H. Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. In Cryptology and Network Security; Springer: Heidelberg, Germany, 2007; pp. 159-174.
-
(2007)
Cryptology and Network Security
, pp. 159-174
-
-
Zhang, R.1
Imai, H.2
-
31
-
-
84955417982
-
Generic constructions of integrated PKE and PEKS
-
Chen, Y.; Zhang, J.; Lin, D.; Zhang, Z. Generic constructions of integrated PKE and PEKS. Des. Codes Cryptogr. 2016, 78, 493-526.
-
(2016)
Des. Codes Cryptogr
, vol.78
, pp. 493-526
-
-
Chen, Y.1
Zhang, J.2
Lin, D.3
Zhang, Z.4
-
32
-
-
38549133925
-
Threshold privacy preserving keyword searches
-
Novy Smokovec, Slovakia, 19-25 January
-
Wang, P.; Wang, H.; Pieprzyk, J. Threshold privacy preserving keyword searches. In Proceedings of the International Conference on Current Trends in Theory and Practice of Informatics, Novy Smokovec, Slovakia, 19-25 January 2008; Volume 4910, pp. 646-658.
-
(2008)
Proceedings of the International Conference on Current Trends in Theory and Practice of Informatics
, vol.4910
, pp. 646-658
-
-
Wang, P.1
Wang, H.2
Pieprzyk, J.3
-
33
-
-
70350676849
-
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data
-
Jeju Island, Korea, 23-25 September
-
Wang, P.; Wang, H.; Pieprzyk, J. An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. In Proceedings of International Workshop on Information Security Applications, Jeju Island, Korea, 23-25 September 2008; Volume 5379, pp. 145-159.
-
(2008)
Proceedings of International Workshop on Information Security Applications
, vol.5379
, pp. 145-159
-
-
Wang, P.1
Wang, H.2
Pieprzyk, J.3
-
34
-
-
84963527101
-
Protecting Your Right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
-
Sun, W.; Yu, S.; Lou, W.; Hou, Y.T.; Li, H. Protecting Your Right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 2016, 27, 1187-1198.
-
(2016)
IEEE Trans. Parallel Distrib. Syst
, vol.27
, pp. 1187-1198
-
-
Sun, W.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
Li, H.5
-
35
-
-
45749099677
-
-
accssed on 26 July
-
Cohen, W.W. Enron Email Dataset. Available online: https://www.cs.cmu.edu/enron/ (accssed on 26 July 2016).
-
(2016)
Enron Email Dataset
-
-
Cohen, W.W.1
-
36
-
-
85021076582
-
-
accssed on 12 May
-
Pairing-Based Cryptography Libray. Available online: http://crypto.stanford.edu/pbc/ (accssed on 12 May 2017).
-
(2017)
-
-
|