X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
attribute-based encryption (1017) 1017
encryption (833) 833
access control (668) 668
cloud computing (657) 657
computer science, information systems (372) 372
privacy (289) 289
attribute based encryption (266) 266
engineering, electrical & electronic (256) 256
security (254) 254
telecommunications (251) 251
verschlüsselung (246) 246
cryptography (200) 200
servers (199) 199
computer science, theory & methods (187) 187
computer science (146) 146
algorithms (129) 129
analysis (119) 119
cloud storage (118) 118
zugriffskontrolle (112) 112
data encryption (110) 110
outsourcing (110) 110
public key (105) 105
computer science, software engineering (104) 104
identity-based encryption (103) 103
multi-authority (101) 101
efficient (99) 99
ciphertext-policy attribute-based encryption (97) 97
revocation (97) 97
entschlüsselung (95) 95
internet of things (92) 92
computer science, hardware & architecture (89) 89
proxy re-encryption (87) 87
secure (86) 86
authentication (85) 85
scheme (83) 83
policies (76) 76
data security (75) 75
computer information security (73) 73
data privacy (70) 70
computer security (68) 68
protocols (64) 64
data storage (63) 63
searchable encryption (63) 63
public-key encryption (57) 57
data sharing (56) 56
server (56) 56
cp-abe (55) 55
internet (55) 55
keyword search (55) 55
computer communication networks (54) 54
ciphertext-policy (51) 51
computation (50) 50
fine-grained access control (50) 50
medical services (50) 50
signatur (49) 49
broadcast encryption (47) 47
cloud-storage (46) 46
access-control (45) 45
berechtigungskontrolle (45) 45
computer science, interdisciplinary applications (45) 45
data retrieval (45) 45
geheimer schlüssel (45) 45
attribute-based (44) 44
outsourced decryption (43) 43
attribute revocation (42) 42
besitzer (42) 42
abe (41) 41
authorization (41) 41
cloud (40) 40
receivers (40) 40
logic gates (39) 39
methods (39) 39
cloud-computing (38) 38
conferences (38) 38
messages (38) 38
attribute-based signature (37) 37
dual system encryption (36) 36
attribute-based access control (35) 35
blockchain (35) 35
engineering (35) 35
user revocation (35) 35
ciphertext policy (34) 34
construction (34) 34
geheimhaltung (34) 34
usage (34) 34
computer science, artificial intelligence (33) 33
computational modeling (32) 32
standard model (32) 32
games (31) 31
signatures (31) 31
confidentiality (30) 30
indexes (30) 30
personal health records (30) 30
access policy (29) 29
anonymity (29) 29
authentifizierung (29) 29
networks (29) 29
personal health record (29) 29
datenverschlüsselung (28) 28
privacy protection (28) 28
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (1795) 1795
Chinese (24) 24
Japanese (14) 14
Korean (12) 12
Czech (1) 1
French (1) 1
German (1) 1
Portuguese (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE transactions on information forensics and security, ISSN 1556-6021, 2013, Volume 8, Issue 8, pp. 1343 - 1354
Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes... 
verifiability | outsourced decryption | Public key | Games | Educational institutions | Attribute-based encryption | Encryption | Servers | PAIRINGS | PROTOCOLS | DELEGATION | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Access control | Data encryption | Network security | Cloud computing | Messages | Policies | Computation | Keys | Transformations
Journal Article
Proceedings of the forty-fifth annual ACM symposium on theory of computing, ISSN 0737-8017, 06/2013, pp. 545 - 554
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an l-bit public index pind and a message m, and a secret key is associated with a Boolean predicate P... 
lattices | attribute-based encryption | Attribute-based encryption | Lattices
Conference Proceeding
Journal of the ACM (JACM), ISSN 1557-735X, 12/2015, Volume 62, Issue 6, pp. 1 - 33
Journal Article
Information sciences, ISSN 0020-0255, 2014, Volume 275, pp. 370 - 384
Journal Article
Theoretical computer science, ISSN 0304-3975, 2012, Volume 422, pp. 15 - 38
Journal Article
Theoretical Computer Science, ISSN 0304-3975, 05/2018, Volume 723, pp. 51 - 72
Standard Broadcast Encryption (BE) and Attribute-Based Encryption (ABE) aim at sending a content to a large arbitrary group of users at once... 
Multi-channel broadcast encryption | Attribute-based encryption | Broadcast encryption | SCHEME | CONSTANT SIZE CIPHERTEXTS | SECURE | COMPUTER SCIENCE, THEORY & METHODS | Cryptography and Security | Computer Science
Journal Article
IEEE transactions on parallel and distributed systems, ISSN 1045-9219, 2014, Volume 25, Issue 8, pp. 2201 - 2210
Journal Article
Mobile Networks and Applications, ISSN 1383-469X, 10/2011, Volume 16, Issue 5, pp. 553 - 561
Journal Article
Pervasive and Mobile Computing, ISSN 1574-1192, 06/2016, Volume 28, pp. 122 - 134
Journal Article
by Lin, S and Zhang, R and Ma, H and Wang, M
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 10/2015, Volume 10, Issue 10, pp. 2119 - 2130
Attribute-based encryption (ABE) is a promising technique for fine-grained access control of encrypted data in a cloud storage, however, decryption involved in the ABEs is usually too expensive for resource-constrained front-end... 
Access control | verifiability | Computational modeling | outsourced decryption | Transforms | Attribute-based encryption | Encryption | Outsourcing | access control | DELEGATION | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Data encryption | Network security | Encapsulation | Costs | Computation | Data storage | Bandwidth | Cryptography | Construction costs
Journal Article
Soft computing (Berlin, Germany), ISSN 1433-7479, 2018, Volume 23, Issue 12, pp. 4009 - 4017
Journal Article
Computer networks (Amsterdam, Netherlands : 1999), ISSN 1389-1286, 2018, Volume 133, pp. 141 - 156
Journal Article
IEEE MICRO, ISSN 0272-1732, 2016, Volume 36, Issue 6, pp. 25 - 35
.... The authors believe that attribute-based encryption (ABE) could be an effective cryptographic tool for secure management of IoT devices... 
feasibility | Internet of things | attribute-based encryption | performance | ABE | Performance evaluatoin | Network security | Encryption | Network management | Cryptography | IoT | Feasibility | Internet of Things | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Journal Article
Computers & security, ISSN 0167-4048, 2011, Volume 30, Issue 5, pp. 320 - 331
Journal Article
SENSORS, ISSN 1424-8220, 04/2019, Volume 19, Issue 7, p. 1695
.... In particular, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising, advanced type of encryption technique that resolves an open challenge to regulate fine... 
single authority schemes | CHEMISTRY, ANALYTICAL | multiauthority schemes | INTERNET | GRAINED ACCESS-CONTROL | CONTROL SYSTEM | THRESHOLD MULTI-AUTHORITY | ENGINEERING, ELECTRICAL & ELECTRONIC | revocation | IMPROVING PRIVACY | SCHEME | INSTRUMENTS & INSTRUMENTATION | internet of things | Ciphertext-Policy Attribute-Based encryption | ROBUST | SECURITY | cloud computing | CLOUD STORAGE | EFFICIENT
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9451, pp. 371 - 390
Conference Proceeding
Security and Communication Networks, ISSN 1939-0114, 09/2016, Volume 9, Issue 14, pp. 2397 - 2411
Journal Article
Concurrency and computation, ISSN 1532-0626, 2019, Volume 31, Issue 3, pp. e4364 - n/a
Journal Article