Publisher
Springer Science and Business Media LLC
Reference40 articles.
1. BaluKuppusamy AK (2014) An expressive and provably secure cipher text-policy attribute-based encryption. Inf Sci 276:354–362
2. ChenY, Jiang ZL, Yiu S, Liu JK, Au MH, Wang X (2014) Fully secure cipher text-policy attribute based encryption with security mediator. In: Proceedings of the 16th international conference on information and communications security, vol 8958, pp 274–289
3. Chu C, Zhu WT, Han J, Liu JK, Xu J, Zhou J (2013) Security concerns in popular cloud storage services. IEEE Pervas Comput 12(4):50–57
4. Deepa N, Pandiaraja P (2019) Hybrid context aware recommendation system for E-Health Care by merkle hash tree from cloud using evolutionary algorithm. Softcomput J 20:20
5. Deepa N, Vijayakumar P, Rawal BS, Balamurugan B (2017) An extensive review and possible attack on the privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. In: IEEE international conference on smart cloud, New York, USA, pp 149–154
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献