设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Springer电子图书(2)
CNKI学位论文(283)
知网期刊论文(392)
在“
Elsevier电子期刊
”中,
命中:
12
条,耗时:0.0829615 秒
在所有数据库中总计命中:
677
条
1.
Identity
-
based
proxy
re
-
encryption
version 2: Making mobile access easy in cloud
作者:
Yunya Zhou
a
;
d
Author Vitae
;
Hua Deng
b
Author Vitae
;
Qianhong Wu
a
;
f
;
qianhong.wu@buaa.edu.cn" class="auth_mail" title="E-mail the cor
re
sponding author
Author Vitae
;
Bo Qin
c
;
e
Author Vitae
;
Jianwei Liu
a
;
h
Author Vitae
;
Yong Ding
g
Author Vitae
关键词:
Data security
;
Identity
-
based
proxy
re
-
encryption
;
IBE
;
IBBE
刊名:Futu
re
Generation Computer Systems
出版年:2016
2.
On the security of two
identity
-
based
conditional
proxy
re
-
encryption
schemes
作者:
Kai He
a
;
c
;
Jian Weng
a
;
cryptjweng@gmail.com" class="auth_mail" title="E-mail the cor
re
sponding author
;
Robert H. Deng
b
;
Joseph K. Liu
c
关键词:
Conditional
proxy
re
-
encryption
;
Identity
-
based
;
Single hop
;
Multi-hop
;
Chosen-ciphertext security
刊名:Theo
re
tical Computer Science
出版年:2016
3.
The Austrian eID ecosystem in the public cloud: How to obtain privacy while p
re
serving practicality
作者:
Bernd Zwattendorfer
;
bernd.zwattendorfer@iaik.tugraz.at" class="auth_mail" title="E-mail the cor
re
sponding author
;
Daniel Slamanig
daniel.slamanig@iaik.tugraz.at" class="auth_mail" title="E-mail the cor
re
sponding author
关键词:
Electronic
identity
(eID)
;
Identity
management
;
Austrian eID system
;
Public cloud
;
Privacy
;
Proxy
re
-
encryption
刊名:Journal of Information Security and Applications
出版年:2016
4.
Chosen-ciphertext secu
re
multi-hop
identity
-
based
conditional
proxy
re
-
encryption
with constant-size ciphertexts
作者:
Kaitai Liang
a
;
kliang4-c@my.cityu.edu.hk" class="auth_mail
;
Cheng-Kang Chu
b
;
chengkangchu@gmail.com" class="auth_mail
;
Xiao Tan
a
;
xiaotan4@gapps.cityu.edu.hk" class="auth_mail
;
Duncan S. Wong
a
;
duncan@cityu.edu.hk" class="auth_mail
;
Chunming Tang
c
;
ctang@gzhu.edu.cn" class="auth_mail
;
Jianying Zhou
b
;
jyzhou@i2r.a-star.edu.sg" class="auth_mail
关键词:
Conditional
proxy
re
-
encryption
;
Identity
-
based
proxy
re
-
encryption
;
Bilinear map
;
Chosen-ciphertext security
;
Constant size ciphertext
刊名:Theo
re
tical Computer Science
出版年:19 June 2014
5.
Multi-use unidi
re
ctional
identity
-
based
proxy
re
-
encryption
from hierarchical
identity
-
based
encryption
作者:
Jun Shao
a
;
chn.junshao@gmail.com
;
Zhenfu Cao
b
;
zfcao@cs.sjtu.edu.cn
关键词:
ID-
based
proxy
re
-
encryption
;
Multi-usability
;
Unidi
re
ctionality
;
Chosen ciphertext security
;
Collusion
re
sistance
刊名:Information Sciences
出版年:2012
6.
Efficient bidi
re
ctional
proxy
re
-
encryption
with di
re
ct chosen-ciphertext security
作者:
Lifeng Guo
a
;
lfguo@sxu.edu.cn
;
Lei Hu
b
;
hu@is.ac.cn
关键词:
Proxy
re
-
encryption
;
Bilinear pairing
;
Chosen-ciphertext security
刊名:Computers and Mathematics with Applications
出版年:2012
7.
Multi-use and unidi
re
ctional
identity
-
based
proxy
re
-
encryption
schemes
作者:
Hongbing Wang
;
Zhenfu Cao
;
Licheng Wang
关键词:
Random padding
;
Identity
-
based
encryption
;
Proxy
re
-
encryption
;
Bilinear pairing
;
Dynamic di
re
cted graph
刊名:Information Sciences
出版年:2010
8.
Encrypted data sharing with multi-owner
based
on digital rights management in online social networks
作者:
Qin-long HUANG
a
;
b
;
c
;
longsec@bupt.edu.cn" class="auth_mail
;
Jing-yi FU
a
;
b
;
c
;
Zhao-feng MA
a
;
b
;
c
;
Yi-xian YANG
a
;
b
;
Xin-xin NIU
a
;
b
关键词:
digital rights management
;
online social networks
;
multi-owner
;
attribute-
based
encryption
;
broadcast
encryption
刊名:The Journal of China Universities of Posts and Telecommunications
出版年:February, 2014
9.
Identity
-
based
data storage in cloud computing
作者:
Jinguang Han
a
;
b
;
jh843@uowmail.edu.au
Author Vitae
;
Willy Susilo
a
;
wsusilo@uow.edu.au
Author Vitae
;
Yi Mu
a
;
ymu@uow.edu.au
Author Vitae
关键词:
Identity
-
based
system
;
Data storage
;
Query
;
Security
刊名:Futu
re
Generation Computer Systems
出版年:2013
10.
Security vulnerability in a non-interactive ID-
based
proxy
re
-
encryption
scheme
作者:
Woo Kwon Koo
;
Jung Yeon Hwang
;
Dong Hoon Lee
关键词:
Cryptography
;
Identity
-
based
proxy
re
-
encryption
;
CCA-security
;
Collusion attack
刊名:Information Processing Letters
出版年:2009
1
2
按检索点细分(12)
题名(5)
关键词(6)
文摘(9)
按出版年细分(12)
2027年及以后(1)
2016年(3)
2013年(1)
2012年(3)
2011年(1)
2010年(1)
2009年(1)
2000年及以前(1)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.