skip to main content
Resultados 1 2 3 4 5 next page
Mostrar Somente
Refinado por: assunto: Access Control remover
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings
Material Type:
Livro
Adicionar ao Meu Espaço

Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings

Laurent, Maryline ; Giannetsos, Thanassis Giannetsos, Thanassis ; Laurent, Maryline ; Laurent, Maryline ; Giannetsos, Thanassis

Netherlands: Springer Nature 2020

Sem texto completo

2
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT
Material Type:
Artigo
Adicionar ao Meu Espaço

Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT

Li, Jiguo ; Zhang, Yichen ; Ning, Jianting ; Huang, Xinyi ; Poh, Geong Sen ; Wang, Debang

IEEE transactions on cloud computing, 2022-04, Vol.10 (2), p.762-773 [Periódico revisado por pares]

Piscataway: IEEE

Texto completo disponível

3
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data
Material Type:
Artigo
Adicionar ao Meu Espaço

Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data

Miao, Yinbin ; Deng, Robert H. ; Liu, Ximeng ; Choo, Kim-Kwang Raymond ; Wu, Hongjun ; Li, Hongwei

IEEE transactions on dependable and secure computing, 2021-07, Vol.18 (4), p.1667-1680

Washington: IEEE

Texto completo disponível

4
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
Material Type:
Artigo
Adicionar ao Meu Espaço

PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT

Belguith, Sana ; Kaaniche, Nesrine ; Laurent, Maryline ; Jemai, Abderrazak ; Attia, Rabah

Computer networks (Amsterdam, Netherlands : 1999), 2018-03, Vol.133, p.141-156 [Periódico revisado por pares]

Amsterdam: Elsevier B.V

Texto completo disponível

5
Efficient Secure Two-Party Protocols: Techniques and Constructions
Material Type:
Livro
Adicionar ao Meu Espaço

Efficient Secure Two-Party Protocols: Techniques and Constructions

Hazay, Carmit Lindell, Yehuda

Berlin, Heidelberg: Springer Nature 2010

Sem texto completo

6
Revocable Attribute-Based Encryption With Data Integrity in Clouds
Material Type:
Artigo
Adicionar ao Meu Espaço

Revocable Attribute-Based Encryption With Data Integrity in Clouds

Ge, Chunpeng ; Susilo, Willy ; Baek, Joonsang ; Liu, Zhe ; Xia, Jinyue ; Fang, Liming

IEEE transactions on dependable and secure computing, 2022-09, Vol.19 (5), p.2864-2872

Washington: IEEE

Texto completo disponível

7
An improved attribute‐based encryption technique towards the data security in cloud computing
Material Type:
Artigo
Adicionar ao Meu Espaço

An improved attribute‐based encryption technique towards the data security in cloud computing

Namasudra, Suyel

Concurrency and computation, 2019-02, Vol.31 (3), p.n/a [Periódico revisado por pares]

Hoboken: Wiley Subscription Services, Inc

Texto completo disponível

8
Privacy-Preserving Data Processing with Flexible Access Control
Material Type:
Artigo
Adicionar ao Meu Espaço

Privacy-Preserving Data Processing with Flexible Access Control

Ding, Wenxiu ; Yan, Zheng ; Deng, Robert H.

IEEE transactions on dependable and secure computing, 2020-03, Vol.17 (2), p.363-376

Washington: IEEE

Texto completo disponível

9
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
Material Type:
Artigo
Adicionar ao Meu Espaço

Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT

Yu, Keping ; Tan, Liang ; Aloqaily, Moayad ; Yang, Hekun ; Jararweh, Yaser

IEEE transactions on industrial informatics, 2021-11, Vol.17 (11), p.7669-7678

Piscataway: IEEE

Texto completo disponível

10
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
Material Type:
Artigo
Adicionar ao Meu Espaço

A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection

Han, Dezhi ; Pan, Nannan ; Li, Kuan-Ching

IEEE transactions on dependable and secure computing, 2022-01, Vol.19 (1), p.316-327

Washington: IEEE

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Mostrar Somente

  1. Recursos Online (1.657)
  2. Revistas revisadas por pares (1.356)

Refinar Meus Resultados

Tipo de Recurso 

  1. Artigos  (1.468)
  2. Livros  (357)
  3. Anais de Congresso  (207)
  4. magazinearticle  (25)
  5. Newsletter Articles  (9)
  6. Book Chapters  (9)
  7. Dissertações  (4)
  8. Reports  (3)
  9. Mais opções open sub menu

Data de Publicação 

De até
  1. Antes de1989  (18)
  2. 1989Até1997  (75)
  3. 1998Até2006  (225)
  4. 2007Até2016  (562)
  5. Após 2016  (1.346)
  6. Mais opções open sub menu

Idioma 

  1. Inglês  (2.080)
  2. Japonês  (78)
  3. Alemão  (18)
  4. Português  (1)
  5. Chinês  (1)
  6. Francês  (1)
  7. Coreano  (1)
  8. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.