H Wang, X Dong, Z Cao - IEEE Transactions on Services …, 2017 - ieeexplore.ieee.org
ABKS has drawn much attention from research and industry in recent years, an ABKS scheme is an encryption scheme that supports keyword search and access control. Attribute …
H Cui, RH Deng, JK Liu, Y Li - … , ACISP 2017, Auckland, New Zealand, July …, 2017 - Springer
To protect data security and privacy in cloud storage systems, a common solution is to outsource data in encrypted forms so that the data will remain secure and private even if …
P Jiang, Y Mu, F Guo, QY Wen - Journal of Computer Science and …, 2017 - Springer
The notion of searchable encrypted keywords introduced an elegant approach to retrieve encrypted data without the need of decryption. Since the introduction of this notion, there are …
P Jiang, Y Mu, F Guo, Q Wen - Computers & Security, 2017 - Elsevier
Public key encryption with keyword search (PEKS) provides the functionality of encrypted data retrieval with keyword privacy in database systems. PEKS allows a user to specify a …
X Wang, Y Mu, R Chen - Concurrency and Computation …, 2017 - Wiley Online Library
Data search and sharing are two important functionalities in social networks. The social network users can form a peer‐to‐peer group and securely and flexibly search and share …
P Chaudhari, ML Das - 2017 ISEA Asia Security and Privacy …, 2017 - ieeexplore.ieee.org
Attribute Based Encryption (ABE) allows fine-grained access control along with data confidentiality. Anonymous Attribute Based Encryption (AABE) supports hiding the access …
G Ohtake, R Safavi-Naini, LF Zhang - Secure IT Systems: 22nd Nordic …, 2017 - Springer
In integrated broadcast-broadband services, viewers receive content via the airwaves as well as additional content via the Internet. The additional content can be personalized by …