您当前的位置:
首页 >
文章列表页 >
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
academic paper | 更新时间:2024-06-05
    • Attribute-based encryption scheme with efficient revocation in data outsourcing systems

    • Journal on Communications   Vol. 36, Issue 10, Pages: 92-100(2015)
    • DOI:10.11959/j.issn.1000-436x.2015254    

      CLC: TP309
    • Online First:2015-10

      Published:25 October 2015

    移动端阅览

  • Xi-xi YAN, Yong-li TANG. Attribute-based encryption scheme with efficient revocation in data outsourcing systems[J]. Journal on Communications, 2015, 36(10): 92-100. DOI: 10.11959/j.issn.1000-436x.2015254.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

2002

下载量

10

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Ciphertext policy attribute-based encryption scheme supporting direct revocation
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Optimization method for attribute-based cryptographic access control in mobile cloud computing

Related Author

Xi-xi YAN
Hui MENG
ZHANG Kejun
WANG Wenbin
XU Shaofei
YU Xinying
WANG Jun
LI Pengcheng

Related Institution

School of Computer Science and Technology,Henan Poly nic University
School of Cyberspace Security, Beijing University of Posts and Telecommunications
Department of Cyberspace Security, Beijing Electronic Science and Technology Institute
School of Cyberspace Security, University of Science and Technology of China
School of Cyber Security and Computer, Hebei University
0