Survey on revocation in ciphertext-policy attribute-based encryption

RR Al-Dahhan, Q Shi, GM Lee, K Kifayat - Sensors, 2019 - mdpi.com
Recently, using advanced cryptographic techniques to process, store, and share data
securely in an untrusted cloud environment has drawn widespread attention from academic …

Efficient attribute-based encryption outsourcing scheme with user and attribute revocation for fog-enabled IoT

L Li, Z Wang, NA Li - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of Internet of Things (IoT) applications, fog computing enables the IoT
to provide efficient services by extending the cloud computing paradigm to the edge of the …

[PDF][PDF] International Journal of Advanced Trends in Computer Science and Engineering

AM Alqudah, H Alquraan, IA Qasmieh, A Alqudah… - International …, 2019 - arxiv.org
Deep Learning is the newest and the current trend of the machine learning field that paid a
lot of the researchers' attention in the recent few years. As a proven powerful machine …

[图书][B] Efficient ciphertext-policy attribute based encryption for cloud-based access control

RRH Al-Dahhan - 2019 - search.proquest.com
Outsourcing data to some cloud servers enables a massive, flexible usage of cloud
computing resources and it is typically held by different organizations and data owners …