Funder
Fund of Lab of Security Insurance of Cyberspace, Sichuan Province
Guangxi Key Laboratory of Cryptography and Information Security
Talent Project of Sichuan University of Science & Engineering
Science Founding of Artificial Intelligence Key Laboratory of Sichuan Province
Opening Project of Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference34 articles.
1. Multi-user keyword search scheme for secure data sharing with fine-grained access control;Zhao,2012
2. X. Zhou, Y. Ding, Z. Wang, X. Li, Z. Xu, J. Ye, Secure outsourcing algorithm of polynomials in cloud computing, in: The 28th International Conference on Software Engineering and Knowledge Engineering, SEKE 2016, Redwood City, San Francisco Bay, USA, July 1–3, 2016, 2016, pp. 46–51.
3. Verifiable delegation of polynomials;Ye;Int. J. Netw. Secur.,2016
4. J. Ye, W. Zhang, S. Wu, Y. Gao, J. Qiu, Attribute-based fine-grained access control with user revocation, in: Second IFIP TC5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2014, Bali, Indonesia, April 14–17, 2014. Proceedings, 2014, pp. 586–595.
5. Secure and efficient fine-grained data access control scheme in cloud computing;Yang;J. High Speed Netw.,2015
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献