Results 171 to 180 of about 4,231 (188)
Some of the next articles are maybe not open access.

Outsourcing decryption of KP-ABE using elliptic curve cryptography

International Journal of Information and Computer Security, 2022
Dilip Kumar, Manoj Kumar
openaire   +1 more source

Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm

2017
With the proliferation of computation and storage outsourcing, access control has become one of the vital problems in cloud computing. Supporting more complex and flexible function, predicate encryption (PE) is gaining more and more attention in access control of decryption outsourcing.
Bai Ping   +3 more
openaire   +1 more source

A Mobile Cloud-based Access Control with Efficiently Outsourced Decryption

2022 10th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2022
Pattavee Sanchol   +2 more
openaire   +1 more source

Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT

2021 18th International ISC Conference on Information Security and Cryptology (ISCISC), 2021
Abdollahi, Sina   +2 more
openaire   +1 more source

Decentralized Attribute-Based Access Control with Attribute Revocation and Outsourced Decryption

2023 15th International Conference on Computer Research and Development (ICCRD), 2023
Feng Yang, Hui Cui, Jiwu Jing
openaire   +1 more source

Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption

IEEE Transactions on Dependable and Secure Computing, 2016
Jian Weng
exaly  

VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud

IEEE Transactions on Services Computing, 2020
Huaqun Wang, De-biao He, Jinguang Han
exaly  

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption

Science China Information Sciences, 2016
Kai Zhang   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy