Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Attribute-based encryption for cloud computing access control: A survey
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
Abstract Attribute-Based Encryption (ABE) offers fine-grained access control policy over
encrypted data, and thus applicable in cloud storage to provide authorized data privacy …
encrypted data, and thus applicable in cloud storage to provide authorized data privacy …
Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation
Multi-authority ciphertext policy attribute-based encryption (CP-ABE) is one of the promising
approaches where multiple authorities issue and manage various attributes to achieve fine …
approaches where multiple authorities issue and manage various attributes to achieve fine …
A review of big data security and privacy protection technology
D Lv, S Zhu, H Xu, R Liu - 2018 IEEE 18th International …, 2018 - ieeexplore.ieee.org
To study and solve the issues of big data security and privacy protection is the key to
promote the healthy development of big data. In this paper, a 3D big data security and …
promote the healthy development of big data. In this paper, a 3D big data security and …
Online/offline rewritable blockchain with auditable outsourced computation
L Guo, Q Wang, WC Yau - IEEE Transactions on Cloud …, 2021 - ieeexplore.ieee.org
Policy-based chameleon hash (PCH) is one of the techniques used for rewriting transaction-
level data stored in blockchains. This technique integrates the access policy of the attribute …
level data stored in blockchains. This technique integrates the access policy of the attribute …
A keyword-searchable ABE scheme from lattice in cloud storage environment
L Liu, S Wang, B He, D Zhang - Ieee Access, 2019 - ieeexplore.ieee.org
Currently, the security situation of data security and user privacy protection is increasingly
serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy …
serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy …
A secure multi‐authority attribute based encryption approach for robust smart grids
This paper presents EMBASS, an Enhanced Multi‐Authority Attribute‐Based Encryption
System for Smart Grids. EMBASS supports outsourced decryption to devices with limited …
System for Smart Grids. EMBASS supports outsourced decryption to devices with limited …
Multi-authority ciphertext policy attribute-based encryption scheme on ideal lattices
Z Liu, ZL Jiang, X Wang, Y Wu… - 2018 IEEE Intl Conf on …, 2018 - ieeexplore.ieee.org
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic
technology that provides fine-grained access control as well as data confidentiality. It …
technology that provides fine-grained access control as well as data confidentiality. It …
Offline/Online Outsourced Attribute‐Based Encryption with Partial Policy Hidden for the Internet of Things
X Yan, G He, J Yu, Y Tang, M Zhao - Journal of Sensors, 2020 - Wiley Online Library
In the Internet of Things (IoT) environment, the intelligent devices collect and share large‐
scale sensitive personal data for a wide range of application. However, the power of storage …
scale sensitive personal data for a wide range of application. However, the power of storage …
Efficient, verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing
M Lyu, X Li, H Li - … International Conference on Data Science in …, 2017 - ieeexplore.ieee.org
In order to realize data sharing in mobile cloud computing, decentralized attribute-based
encryption (ABE) has been widely concerned. However, the existing ABE schemes are full of …
encryption (ABE) has been widely concerned. However, the existing ABE schemes are full of …