Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
A survey on attribute-based encryption schemes suitable for the internet of things
The Internet of Things (IoT) is an information service paradigm based on the integration of
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …
Efficient revocable attribute-based encryption with verifiable data integrity
S Chen, J Li, Y Zhang, J Han - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Nowadays, cloud computing and cloud storage services that can reduce the local workload
are becoming increasingly popular, allowing individual and corporate users to upload data …
are becoming increasingly popular, allowing individual and corporate users to upload data …
BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT
The Internet of Things (IoT) changed our lives with huge amounts of data production. Due to
source-limited IoT devices, one of the best ways to process the data is cloud storage …
source-limited IoT devices, one of the best ways to process the data is cloud storage …
Revocable and unbounded attribute-based encryption scheme with adaptive security for integrating digital twins in internet of things
Internet of Things (IoTs) has been a burgeoning field that transforms the ubiquitous objects
to interconnected devices and intelligent system. Today, with the emerging of innovative …
to interconnected devices and intelligent system. Today, with the emerging of innovative …
Revocable blockchain-aided attribute-based encryption with escrow-free in cloud storage
Y Guo, Z Lu, H Ge, J Li - IEEE Transactions on Computers, 2023 - ieeexplore.ieee.org
The massive amount of data generated by the Internet of Things (IoT) and the need to store
that data presents a huge challenge for storage. However, meeting this challenge has also …
that data presents a huge challenge for storage. However, meeting this challenge has also …
Fine-grained data sharing with enhanced privacy protection and dynamic users group service for the IoV
The Internet of Vehicles (IoV) is expected to play a revolutionary role in improving users'
driving experience and urban traffic governance. By widely absorbing emerging …
driving experience and urban traffic governance. By widely absorbing emerging …
RS-HABE: Revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud
Personal e-health records (EHR) enable medical workers (eg, doctors and nurses) to
conveniently and quickly access each patient's medical history through the public cloud …
conveniently and quickly access each patient's medical history through the public cloud …
Verifiable multikeyword search encryption scheme with anonymous key generation for medical internet of things
X Liu, X Yang, Y Luo, Q Zhang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The development of the Internet of Things (IoT) has given birth to new applications and
services. Accordingly, because the IoT application system collects a large amount of data …
services. Accordingly, because the IoT application system collects a large amount of data …
Revocable policy-based chameleon hash
Policy-based chameleon hash (PCH) is a cryptographic building block which finds
increasing practical applications. Given a message and an access policy, for any chameleon …
increasing practical applications. Given a message and an access policy, for any chameleon …