-
1
-
-
84905024335
-
Toward efficient and privacy-preserving computing in big data era
-
Lu, Rongxing, Zhu, Hui, Liu, Ximeng, Liu, Joseph K., Shao, Jun, Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28:4 (2014), 46–50.
-
(2014)
IEEE Netw.
, vol.28
, Issue.4
, pp. 46-50
-
-
Lu, R.1
Zhu, H.2
Liu, X.3
Liu, J.K.4
Shao, J.5
-
2
-
-
84938848384
-
Coalition games for spatio-temporal big data in Internet of vehicles environment: a comparative analysis
-
Kumar, Neeraj, Misra, Sudip, Rodrigues, Joel J.P.C., Obaidat, Mohammad S., Coalition games for spatio-temporal big data in Internet of vehicles environment: a comparative analysis. IEEE Internet Things J. 2:4 (2015), 310–320.
-
(2015)
IEEE Internet Things J.
, vol.2
, Issue.4
, pp. 310-320
-
-
Kumar, N.1
Misra, S.2
Rodrigues, J.J.P.C.3
Obaidat, M.S.4
-
3
-
-
84961786656
-
Toward secure large-scale machine-to-machine communications in 3gpp networks: challenges and solutions
-
Lai, Chengzhe, Lu, Rongxing, Zheng, Dong, Li, Hui, Shen, Xuemin (sherman), Toward secure large-scale machine-to-machine communications in 3gpp networks: challenges and solutions. IEEE Commun. Mag. 53:12 (2015), 12–19.
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.12
, pp. 12-19
-
-
Lai, C.1
Lu, R.2
Zheng, D.3
Li, H.4
Shen, X.S.5
-
4
-
-
85029604834
-
Cisco delivers vision of fog computing to accelerate value from billions of connected devices. Technical Report
-
The Network, Cisco delivers vision of fog computing to accelerate value from billions of connected devices. Technical Report., 2014.
-
(2014)
-
-
The Network1
-
5
-
-
24944554962
-
Fuzzy identity-based encryption
-
Sahai, Amit, Waters, Brent, Fuzzy identity-based encryption. EUROCRYPT 2005 LNCS, vol. 3494, 2005, 457–473.
-
(2005)
EUROCRYPT 2005, LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
6
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Ari Juels Rebecca N. Wright Sabrina De Capitani di Vimercati ACM
-
Goyal, Vipul, Pandey, Omkant, Sahai, Amit, Waters, Brent, Attribute-based encryption for fine-grained access control of encrypted data. Juels, Ari, Wright, Rebecca N., di Vimercati, Sabrina De Capitani, (eds.) ACM Conference on Computer and Communications Security, 2006, ACM, 89–98.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
7
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
John Bethencourt, Amit Sahai, Brent Waters, Ciphertext-policy attribute-based encryption, in: IEEE S&P 2007, 2007, pp. 321–334.
-
(2007)
in: IEEE S&P 2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
8
-
-
45749116552
-
Provably secure ciphertext policy abe
-
Ling Cheung, Calvin Newport, Provably secure ciphertext policy abe, in: ACM CCS 2007, 2007, pp. 456–465.
-
(2007)
in: ACM CCS 2007
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
9
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Lewko, Allison, Okamoto, Tatsuaki, Sahai, Amit, Takashima, Katsuyuki, Waters, Brent, Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. EUROCRYPT LNCS, vol. 6110, 2010, 62–91.
-
(2010)
EUROCRYPT, LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
10
-
-
77957011503
-
Fully secure functional encryption with general relations from the decisional linear assumption
-
Tatsuaki Okamoto, Katsuyuki Takashima, Fully secure functional encryption with general relations from the decisional linear assumption. CRYPTO LNCS, vol. 6223, 2010, 191–208.
-
(2010)
CRYPTO, LNCS
, vol.6223
, pp. 191-208
-
-
Tatsuaki Okamoto, K.T.1
-
11
-
-
84883113038
-
Energy provisioning in wireless rechargeable sensor networks
-
He, Shibo, Chen, Jiming, Jiang, Fachang, Yau, David K.Y., Xing, Guoliang, Sun, Youxian, Energy provisioning in wireless rechargeable sensor networks. IEEE Trans. Mob. Comput. 12:10 (2013), 1931–1942.
-
(2013)
IEEE Trans. Mob. Comput.
, vol.12
, Issue.10
, pp. 1931-1942
-
-
He, S.1
Chen, J.2
Jiang, F.3
Yau, D.K.Y.4
Xing, G.5
Sun, Y.6
-
12
-
-
85029586197
-
-
IDC: Top 10 technology predictions for 2015. Technical report.
-
Gil Press, IDC: Top 10 technology predictions for 2015. Technical report. http://www.forbes.com/sites/gilpress/2014/12/02/idc-top-10-technology-predictions-for-2015/#17112a59650e.
-
-
-
Press, G.1
-
14
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Christian Cachin Jan Camenisch Springer
-
Canetti, Ran, Halevi, Shai, Katz, Jonathan, Chosen-ciphertext security from identity-based encryption. Cachin, Christian, Camenisch, Jan, (eds.) EUROCRYPT Lecture Notes in Computer Science, vol. 3027, 2004, Springer, 207–222.
-
(2004)
EUROCRYPT, Lecture Notes in Computer Science
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
15
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Fujisaki, Eiichiro, Okamoto, Tatsuaki, Secure integration of asymmetric and symmetric encryption schemes. CRYPTO 1999 LNCS, vol. 1666, 1999, 537–554.
-
(1999)
CRYPTO 1999, LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
16
-
-
34547273527
-
Attribute-based encryption for fine grained access control of encrypted data
-
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters, Attribute-based encryption for fine grained access control of encrypted data, in: ACM CCS 2006, 2006, pp. 89–98.
-
(2006)
in: ACM CCS 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
17
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
Rafail Ostrovsky, Amit Sahai, Brent Waters, Attribute-based encryption with non-monotonic access structures, in: ACM CCS 2007, 2007, pp. 195–203.
-
(2007)
in: ACM CCS 2007
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
18
-
-
70350345210
-
Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions
-
Waters, Brent, Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. EUROCRYPT LNCS, vol. 5677, 2009, 619–636.
-
(2009)
EUROCRYPT, LNCS
, vol.5677
, pp. 619-636
-
-
Waters, B.1
-
19
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Waters, Brent, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. PKC LNCS, vol. 6571, 2011, 53–70.
-
(2011)
PKC, LNCS
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
20
-
-
84871604439
-
Fully secure unbounded inner-product and attribute-based encryption
-
Tatsuaki Okamoto, Katsuyuki Takashima, Fully secure unbounded inner-product and attribute-based encryption. ASIACRYPT LNCS, vol. 7658, 2012, 349–366.
-
(2012)
ASIACRYPT, LNCS
, vol.7658
, pp. 349-366
-
-
Tatsuaki Okamoto, K.T.1
-
21
-
-
24944554962
-
Fuzzy identity-based encryption
-
Ronald Cramer Springer
-
Sahai, Amit, Waters, Brent, Fuzzy identity-based encryption. Cramer, Ronald, (eds.) EUROCRYPT Lecture Notes in Computer Science, vol. 3494, 2005, Springer, 457–473.
-
(2005)
EUROCRYPT, Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
22
-
-
84951824554
-
Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data
-
Springer
-
Yang, Yanjiang, Liu, Joseph K., Liang, Kaitai, Raymond Choo, Kim-Kwang, Zhou, Jianying, Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. European Symposium on Research in Computer Security, 2015, Springer, 146–166.
-
(2015)
European Symposium on Research in Computer Security
, pp. 146-166
-
-
Yang, Y.1
Liu, J.K.2
Liang, K.3
Raymond Choo, K.-K.4
Zhou, J.5
-
23
-
-
84936984467
-
Cloud based data sharing with fine-grained proxy re-encryption
-
Yang, Yanjiang, Zhu, Haiyan, Lu, Haibing, Weng, Jian, Zhang, Youcheng, Raymond Choo, Kim-Kwang, Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28 (2016), 122–134.
-
(2016)
Pervasive Mob. Comput.
, vol.28
, pp. 122-134
-
-
Yang, Y.1
Zhu, H.2
Lu, H.3
Weng, J.4
Zhang, Y.5
Raymond Choo, K.-K.6
-
24
-
-
84880652100
-
Attribute-based encryption with verifiable outsourced decryption
-
Junzuo Lai, Chaowen Guan, Deng, Robert H., Weng, Jian, Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8:8 (2013), 1343–1354.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.8
, pp. 1343-1354
-
-
Junzuo Lai, C.G.1
Deng, R.H.2
Weng, J.3
-
25
-
-
84894634556
-
Securely outsourcing attribute-based encryption with checkability
-
Li, Jin, Huang, Xinyi, Li, Jingwei, Chen, Xiaofeng, Xiang, Yang, Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25:8 (2014), 2201–2210.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.8
, pp. 2201-2210
-
-
Li, J.1
Huang, X.2
Li, J.3
Chen, X.4
Xiang, Y.5
-
26
-
-
84939231120
-
Revisiting attribute-based encryption with verifiable outsourced decryption
-
Lin, Suqing, Zhang, Rui, Ma, Hui, Wang, Mingsheng, Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10:10 (2015), 2119–2130.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.10
, pp. 2119-2130
-
-
Lin, S.1
Zhang, R.2
Ma, H.3
Wang, M.4
-
27
-
-
84930201567
-
Attribute-based encryption with efficient verifiable outsourced decryption
-
Qin, Baodong, Deng, Robert H., Liu, Shengli, Ma, Siqi, Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10:7 (2015), 1384–1393.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.7
, pp. 1384-1393
-
-
Qin, B.1
Deng, R.H.2
Liu, S.3
Ma, S.4
-
28
-
-
84985919305
-
Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption
-
Mao, Xianping, Lai, Junzuo, Mei, Qixiang, Chen, Kefei, Weng, Jian, Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Dependable Secure Comput. 13:5 (2015), 533–546.
-
(2015)
IEEE Trans. Dependable Secure Comput.
, vol.13
, Issue.5
, pp. 533-546
-
-
Mao, X.1
Lai, J.2
Mei, Q.3
Chen, K.4
Weng, J.5
-
29
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Blaze, Matt, Bleumer, Gerrit, Strauss, Martin, Divertible protocols and atomic proxy cryptography. EUROCRYPT LNCS, vol. 1403, 1998, 127–144.
-
(1998)
EUROCRYPT, LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
30
-
-
85029604742
-
-
Cloud storage forensics. ISBN.
-
Darren Quick, Ben Martini, Raymond Choo, Cloud storage forensics. ISBN: 978-0-12-419970-5. http://www.sciencedirect.com/science/book/9780124199705.
-
-
-
Quick, D.1
Martini, B.2
Choo, R.3
-
31
-
-
85020845083
-
Cloud incident handling and forensic-by-design: cloud storage as a case study
-
Ab Rahman, Nurul Hidayah, Wahyu Cahyani, Niken Dwi, Raymond Choo, Kim-Kwang, Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurr. Comput.: Pract. Exper., 2016.
-
(2016)
Concurr. Comput.: Pract. Exper.
-
-
Ab Rahman, N.H.1
Wahyu Cahyani, N.D.2
Raymond Choo, K.-K.3
-
32
-
-
84992603948
-
Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data
-
Quick, Darren, Raymond Choo, Kim-Kwang, Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data. Softw. - Pract. Exp., 2016.
-
(2016)
Softw. - Pract. Exp.
-
-
Quick, D.1
Raymond Choo, K.-K.2
-
33
-
-
85018167456
-
Forensic investigation of p2p cloud storage services and backbone for iot networks: Bittorrent sync as a case study
-
Teing, Yee-Yang, Dehghantanha, Ali, Raymond Choo, Kim-Kwang, Yang, Laurence T., Forensic investigation of p2p cloud storage services and backbone for iot networks: Bittorrent sync as a case study. Comput. Electr. Eng., 2016.
-
(2016)
Comput. Electr. Eng.
-
-
Teing, Y.-Y.1
Dehghantanha, A.2
Raymond Choo, K.-K.3
Yang, L.T.4
-
34
-
-
84963728330
-
Forensic-by-design framework for cyber-physical cloud systems
-
Ab Rahman, Nurul Hidayah, Glisson, William Bradley, Yang, Yanjiang, Raymond Choo, Kim-Kwang, Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Comput. 3:1 (2016), 50–59.
-
(2016)
IEEE Cloud Comput.
, vol.3
, Issue.1
, pp. 50-59
-
-
Ab Rahman, N.H.1
Glisson, W.B.2
Yang, Y.3
Raymond Choo, K.-K.4
-
35
-
-
84978287530
-
Chosen ciphertext secure attribute-based encryption with outsourced decryption
-
Springer
-
Zuo, Cong, Shao, Jun, Wei, Guiyi, Xie, Mande, Ji, Min, Chosen ciphertext secure attribute-based encryption with outsourced decryption. Australasian Conference on Information Security and Privacy, 2016, Springer, 495–508.
-
(2016)
Australasian Conference on Information Security and Privacy
, pp. 495-508
-
-
Zuo, C.1
Shao, J.2
Wei, G.3
Xie, M.4
Ji, M.5
-
36
-
-
85029598066
-
-
The pairing-based cryptography library
-
Ben Lynn, The pairing-based cryptography library. 2012.
-
(2012)
-
-
Lynn, B.1
|