Author:
Cheng Yong,Zhou Huaizhe,Ma Jun,Wang Zhiying
Publisher
Springer International Publishing
Reference21 articles.
1. Nag, A., Choudhary, S., Dawn, S., Basu, S.: Secure data outsourcing in the cloud using multi-secret sharing scheme. In: Mandal, J., Satapathy, S., Sanyal, M., Bhateja, V. (eds.) AISC, vol. 458, pp. 337–343. Springer, Singapore (2017). doi:
10.1007/978-981-10-2035-3_34
2. Athira, R., Tina, S., Arun, R., Suvanam, S.: A survey on attribute based encryption schemes for data sharing. In: Proceedings of the 2016 International Conference on Emerging Trends in Engineering and Management, pp. 19–23 (2016)
3. Lecture Notes in Computer Science;A Sahai,2005
4. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
5. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 321–334. IEEE (2007)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献