Amanote Research
Register
Sign In
Ciphertext-Policy Attribute Authentication Scheme Based on Linear Codes
DEStech Transactions on Computer Science and Engineering
doi 10.12783/dtcse/icitia2017/13272
Full Text
Open PDF
Abstract
Available in
full text
Date
September 15, 2017
Authors
Yun Song
Zhihui Li
Publisher
DEStech Publications
Related search
Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing
Mobile Information Systems
Computer Networks
Computer Science Applications
Communications
An Efficient Key-Policy Attribute-Based Encryption Scheme With Constant Ciphertext Length
Mathematical Problems in Engineering
Mathematics
Engineering
Highly Secure Method Based on Ciphertext Policy Attribute Based Encryption in Hadoop System
International Journal of Computer Applications
New Ciphertext-Policy Attribute-Based Access Control With Efficient Revocation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Protected Health Care Application in Cloud Using Ciphertext-Policy Attribute-Based Encryption and Hierarchical Attribute-Based Encryption
International Journal of Innovative Technology and Exploring Engineering
Mechanics of Materials
Electronic Engineering
Civil
Structural Engineering
Electrical
Computer Science
Traceable Ciphertext-Policy Attribute-Based Encryption With Verifiable Outsourced Decryption in eHealth Cloud
Wireless Communications and Mobile Computing
Computer Networks
Electronic Engineering
Information Systems
Electrical
Communications
Securing E-Health Data Using Ciphertext-Policy Attribute-Based Encryption With Dynamic User Revocation
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
A Secure Scheme for Trust Attribute Based Lightweight Authentication (TALA) in IoT Healthcare Environment
International Journal of Innovative Technology and Exploring Engineering
Mechanics of Materials
Electronic Engineering
Civil
Structural Engineering
Electrical
Computer Science
Verifiable Outsourced Decryption of Attribute-Based Encryption With Constant Ciphertext Length
Security and Communication Networks
Computer Networks
Information Systems
Communications