An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption. [PDF]
Hu R +6 more
europepmc +1 more source
Blockchain-Based Data Access Control and Key Agreement System in IoT Environment. [PDF]
Lee J +6 more
europepmc +1 more source
Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications. [PDF]
Sun H, Li C, Zhang J, Liang S, Huang W.
europepmc +1 more source
Protecting the privacy of keywords in the field of search over outsourced cloud data is a challenging task. In IEEE Transactions on Services Computing (Vol. 17 No. 2, March/April 2024), Li et al.
Varri, Uma Sankararao
core
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems. [PDF]
Chen Y, Dong G, Xu C, Hao Y, Zhao Y.
europepmc +1 more source
Public Key Encryption with Keyword Search in Cloud: A Survey. [PDF]
Zhou Y, Li N, Tian Y, An D, Wang L.
europepmc +1 more source
A Review of Functional Encryption in IoT Applications. [PDF]
Shahzad K, Zia T, Qazi EU.
europepmc +1 more source
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings. [PDF]
Zhang S, Wen Q, Li W, Zhang H, Jin Z.
europepmc +1 more source
GL-Tree: A Hierarchical Tree Structure for Efficient Retrieval of Massive Geographic Locations. [PDF]
Liu B, Zhang C, Xin Y.
europepmc +1 more source
Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme. [PDF]
Tang Y, Jin M, Meng H, Yang L, Zheng C.
europepmc +1 more source

