Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Livro
|
![]() |
Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, ProceedingsLaurent, Maryline ; Giannetsos, Thanassis Giannetsos, Thanassis ; Laurent, Maryline ; Laurent, Maryline ; Giannetsos, ThanassisNetherlands: Springer Nature 2020Sem texto completo |
2 |
Material Type: Artigo
|
![]() |
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoTLi, Jiguo ; Zhang, Yichen ; Ning, Jianting ; Huang, Xinyi ; Poh, Geong Sen ; Wang, DebangIEEE transactions on cloud computing, 2022-04, Vol.10 (2), p.762-773 [Periódico revisado por pares]Piscataway: IEEETexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud DataMiao, Yinbin ; Deng, Robert H. ; Liu, Ximeng ; Choo, Kim-Kwang Raymond ; Wu, Hongjun ; Li, HongweiIEEE transactions on dependable and secure computing, 2021-07, Vol.18 (4), p.1667-1680Washington: IEEETexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoTBelguith, Sana ; Kaaniche, Nesrine ; Laurent, Maryline ; Jemai, Abderrazak ; Attia, RabahComputer networks (Amsterdam, Netherlands : 1999), 2018-03, Vol.133, p.141-156 [Periódico revisado por pares]Amsterdam: Elsevier B.VTexto completo disponível |
5 |
Material Type: Livro
|
![]() |
Efficient Secure Two-Party Protocols: Techniques and ConstructionsHazay, Carmit Lindell, YehudaBerlin, Heidelberg: Springer Nature 2010Sem texto completo |
6 |
Material Type: Artigo
|
![]() |
Revocable Attribute-Based Encryption With Data Integrity in CloudsGe, Chunpeng ; Susilo, Willy ; Baek, Joonsang ; Liu, Zhe ; Xia, Jinyue ; Fang, LimingIEEE transactions on dependable and secure computing, 2022-09, Vol.19 (5), p.2864-2872Washington: IEEETexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
An improved attribute‐based encryption technique towards the data security in cloud computingNamasudra, SuyelConcurrency and computation, 2019-02, Vol.31 (3), p.n/a [Periódico revisado por pares]Hoboken: Wiley Subscription Services, IncTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Privacy-Preserving Data Processing with Flexible Access ControlDing, Wenxiu ; Yan, Zheng ; Deng, Robert H.IEEE transactions on dependable and secure computing, 2020-03, Vol.17 (2), p.363-376Washington: IEEETexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoTYu, Keping ; Tan, Liang ; Aloqaily, Moayad ; Yang, Hekun ; Jararweh, YaserIEEE transactions on industrial informatics, 2021-11, Vol.17 (11), p.7669-7678Piscataway: IEEETexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy ProtectionHan, Dezhi ; Pan, Nannan ; Li, Kuan-ChingIEEE transactions on dependable and secure computing, 2022-01, Vol.19 (1), p.316-327Washington: IEEETexto completo disponível |