Efficient and Enhanced Attribute-Based Encryption for Cloud Computing
Abstract
Full Text:
PDFReferences
C. Chu, W.T. Zhu, J. Han, J.K. Liu, J. Xu, J. Zhou. Security concerns in popular cloud storage services, IEEE Pervas Comput. 2013; 12(4); 50–7p.
T. Jiang, X. Chen, J. Li, D.S. Wong, J. Ma, J.K. Liu. TIMER: secure and reliable cloud storage against data re-outsourcing, In: Proceedings of the 10th International Conference on Information Security Practice and Experience. Vol. 8434, May 2014, 346–58p.
K. Liang, J.K. Liu, D.S. Wong, W. Susilo. An efficient cloud based revocable identity-based proxy re-encryption scheme for public clouds data sharing, Comput Secur ESORICS. 2014; 8712: 257–72p.
T.H. Yuen, Y. Zhang, S. Yiu, J.K. Liu. Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks, Comput Secur ESORICS. 2014; 8712: 130–47p.
K. Liang, M.H. Au, J.K. Liu, W. Susilo, D.S. Wong, G. Yang, T.V.X. Phuong, Q. Xie. A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing, IEEE Trans Inform Forensic Security. 2014; 9(10): 1667–80p.
Refbacks
- There are currently no refbacks.