P2 KASE A2—privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation (Englisch)
Freier Zugriff
- Neue Suche nach: Padhya, Mukti
- Neue Suche nach: Jinwala, Devesh C.
- Neue Suche nach: Padhya, Mukti
- Neue Suche nach: Jinwala, Devesh C.
In:
IET Information Security
;
14
, 6
;
704-723
;
2020
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:P2 KASE A2—privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation
-
Beteiligte:Padhya, Mukti ( Autor:in ) / Jinwala, Devesh C. ( Autor:in )
-
Erschienen in:IET Information Security ; 14, 6 ; 704-723
-
Verlag:
- Neue Suche nach: The Institution of Engineering and Technology
-
Erscheinungsdatum:22.07.2020
-
Format / Umfang:20 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Metadata by IET is licensed under CC BY 3.0
Inhaltsverzeichnis – Band 14, Ausgabe 6
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 613
-
Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulatorNakanishi, Toru / Kanatani, Takeshi et al. | 2020
- 625
-
Pairing free identity based aggregate signcryption schemeAbouelkheir, Eman / El-sherbiny, Shamia et al. | 2020
- 633
-
Efficient elliptic curve Diffie-Hellman computation at the 256-bit security levelNath, Kaushik / Sarkar, Palash et al. | 2020
- 641
-
More realistic analysis of mass surveillance – security in multi-surveillant settingsLi, Geng / Liu, Jianwei / Zhang, Zongyang et al. | 2020
- 654
-
Further study on constructing bent functions outside the completed Maiorana–McFarland classLiu, Shishi / Zhang, Fengrong / Pasalic, Enes / Xia, Shixiong / Zhuo, Zepeng et al. | 2020
- 661
-
Post-quantum protocol for computing set intersection cardinality with linear complexityDebnath, Sumit Kumar / Stănică, Pantelimon / Choudhury, Tanmay / Kundu, Nibedita et al. | 2020
- 670
-
SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearbyAlex, Sona / Pattathil, Deepthi P / Kakkanattu Jagalchandran, Dhanaraj et al. | 2020
- 683
-
C-NSA: a hybrid approach based on artificial immune algorithms for anomaly detection in web trafficDandıl, Emre et al. | 2020
- 694
-
Economic feasibility study for stealthy socialbot network establishmentHosseini Moghaddam, Samaneh / Abbaspour, Maghsoud et al. | 2020
- 704
-
P2 KASE A2—privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegationPadhya, Mukti / Jinwala, Devesh C. et al. | 2020
- 724
-
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptographyFeng, Qi / He, Debiao / Wang, Huaqun / Wang, Ding / Huang, Xinyi et al. | 2020
- 733
-
Achieving secure and convenient WLAN sharing in personalYan, Zhicheng / Yang, Chao / You, Wei / Guo, Jingjing / Zhang, Junwei / Zheng, Yu / Ma, Jianfeng et al. | 2020
- 745
-
Statistical watermarking approach for 3D mesh using local curvature estimationSharma, Neha / Panda, Jeebananda et al. | 2020
- 754
-
Non-stochastic hypothesis testing for privacyFarokhi, Farhad et al. | 2020
- 764
-
Tightly-secure two-pass authenticated key exchange protocol using twin Diffie–Hellman problemZeng, Runzhi / Wang, Libin et al. | 2020
- 773
-
GUIM-SMD: guilty user identification model using summation matrix-based distributionGupta, Ishu / Singh, Ashutosh Kumar et al. | 2020
- 783
-
New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystemYang, Jing / Fu, Fang-Wei et al. | 2020