S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The …
C Ge, W Susilo, Z Liu, J Xia… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The emergence of cloud infrastructure has significantly reduced the costs of hardware and software resources in computing infrastructure. To ensure security, the data is usually …
K Liang, W Susilo - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
To date, the growth of electronic personal data leads to a trend that data owners prefer to remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …
W Shen, T Hu, C Zhang, S Ma - Journal of manufacturing systems, 2021 - Elsevier
With the rapid development of digital twin technology, a large amount of digital twin data named as big digital twin data (BDTD), is generated in the lifecycle of equipment, which is …
H Deng, Z Qin, Q Wu, Z Guan, RH Deng… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the …
S Wang, K Liang, JK Liu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed …
Motivated by the recent searchable symmetric encryption protocol of Cash et al., we propose a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …
Bring your own devices have become a new symbol of industrial and education institutional culture to date. A single individual can gain access to personal data anytime at anywhere of …
P Xu, T Jiao, Q Wu, W Wang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Recently, a number of extended Proxy Re-Encryptions (PRE), eg Conditional (CPRE), identity-based PRE (IPRE) and broadcast PRE (BPRE), have been proposed for flexible …