您当前的位置:
首页 >
文章列表页 >
Optimization method for attribute-based cryptographic access control in mobile cloud computing
Papers | 更新时间:2024-06-05
    • Optimization method for attribute-based cryptographic access control in mobile cloud computing

    • Journal on Communications   Vol. 39, Issue 7, Pages: 39-49(2018)
    • DOI:10.11959/j.issn.1000-436x.2018112    

      CLC: TP309.2
    • Online First:2018-07

      Published:25 July 2018

    移动端阅览

  • Jian LIU, Ming XIAN, Huimei WANG, et al. Optimization method for attribute-based cryptographic access control in mobile cloud computing[J]. Journal on Communications, 2018, 39(7): 39-49. DOI: 10.11959/j.issn.1000-436x.2018112.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1868

下载量

2

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Ciphertext policy attribute-based encryption scheme supporting direct revocation
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
Privilege separation of data sharing scheme using attribute-based encryption
Fine-grained model capability access control mechanism based on machine unlearning

Related Author

ZHANG Kejun
WANG Wenbin
XU Shaofei
YU Xinying
WANG Jun
LI Pengcheng
QIAN Rong
Xi-xi YAN

Related Institution

School of Cyberspace Security, Beijing University of Posts and Telecommunications
Department of Cyberspace Security, Beijing Electronic Science and Technology Institute
School of Cyberspace Security, University of Science and Technology of China
School of Computer Science and Technology,Henan Poly nic University
School of Computer Science and Technology,Henan Polytechnic University
0