Publisher
Springer International Publishing
Reference26 articles.
1. Chow, R., Golle, P., Jakobsson, M., et al.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of IEEE 3rd International Conference on Cloud Computing, pp. 85–90, July 2010
2. Lecture Notes in Computer Science;A Shamir,1985
3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium Security and Privacy, Berkeley, CA, pp. 321–334 (2007)
4. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of Public Key Cryptography (PKC 2011), pp. 53–70 (2011)
5. Wang, S., Zhou, J., Liu, J.K., et al.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(6), 1265–1277 (2016)