您当前的位置:
首页 >
文章列表页 >
Proxy re-encryption based multi-factor access control scheme in cloud
Papers | 更新时间:2024-06-05
    • Proxy re-encryption based multi-factor access control scheme in cloud

    • Journal on Communications   Vol. 39, Issue 2, Pages: 96-104(2018)
    • DOI:10.11959/j.issn.1000-436x.2018028    

      CLC: TP393
    • Online First:2018-02

      Published:25 February 2018

    移动端阅览

  • Mang SU, Guozhen SHI, Anmin FU, et al. Proxy re-encryption based multi-factor access control scheme in cloud[J]. Journal on Communications, 2018, 39(2): 96-104. DOI: 10.11959/j.issn.1000-436x.2018028.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

2122

下载量

2

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
Achieving efficient dynamic cryptographic access control in cloud storage
Roles query algorithm in cloud computing environment based on user require
Blockchain-based user-friendly data retrieval and sharing scheme in cloud-assisted industrial Internet of things

Related Author

ZHANG Kejun
WANG Wenbin
XU Shaofei
YU Xinying
WANG Jun
LI Pengcheng
QIAN Rong
Ruiqi LI

Related Institution

School of Cyberspace Security, Beijing University of Posts and Telecommunications
Department of Cyberspace Security, Beijing Electronic Science and Technology Institute
School of Cyberspace Security, University of Science and Technology of China
College of Cyber Science, Nankai University
Tianjin Key Laboratory of Network and Data Security Technology
0