Search

Showing total 6 results

Search Constraints

Start Over You searched for: Topic access control Remove constraint Topic: access control Topic data encryption Remove constraint Topic: data encryption Journal computer journal Remove constraint Journal: computer journal
6 results

Search Results

1. Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage.

2. Enforcing Role-Based Access Control for Secure Data Storage in the Cloud.

3. Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.

4. Matrix FHE and Its Application in Optimizing Bootstrapping.

5. Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks.

6. Secure and Efficient Attribute-Based Encryption with Keyword Search.