Author:
Ashouri-Talouki Maede,Kahani Nafiseh,Barati Masoud,Abedini Zomorod
Publisher
Springer Science and Business Media LLC
Reference30 articles.
1. Cheng Y, Zhou H, Ma J, Wang Z (2017) Efficient CP-ABE with non-monotonic access structures, In: Third International Conference on Cloud Computing and Security (ICCCS) pp, 315–32
2. Abedini Z (2020) Privacy-preserving CP-ABE access control with attribute revocation. Master’s thesis University of Isfahan
3. Ashouri-Talouki M, Kahani N, Barati M (2023) Privacy-preserving attribute-based access control with non-monotonic access structure, In: 7th Cyber Security in Networking Conference (CSNet) pp, 32–38
4. Zhang Y, Deng RH, Xu S, Sun J, Li Q, Zheng D (2020) Attribute-based encryption for cloud computing access control: a survey. ACM Computing Surveys (CSUR) 53(4):1–41
5. Chase M (2007) Multi-authority attribute based encryption, In: Theory of Cryptography: 4th Theory of Cryptography Conference TCC pp, 515–534
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献