Search

Your search keyword '"Access structure"' showing total 543 results

Search Constraints

Start Over You searched for: Descriptor "Access structure" Remove constraint Descriptor: "Access structure" Topic business Remove constraint Topic: business
543 results on '"Access structure"'

Search Results

1. An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain

2. TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT

3. Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things

4. Privacy information verification of homomorphic algorithm for aggregated data based on fog layer structure

5. A Blockchain-Based CP-ABE Scheme with Partially Hidden Access Structures

6. Secret Sharing Schemes from Linear Codes over F2+vF2+v2F2

7. PAC: Privacy preserving proxy re-encryption for access control in public cloud

8. A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices

9. On ideal homomorphic secret sharing schemes and their decomposition

10. An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments

11. Complex and flexible data access policy in attribute-based encryption

12. A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models

13. Boolean functions with six-valued Walsh spectra and their application

14. APPLSS: Adaptive privacy preserved location sharing scheme based on attribute-based encryption

15. PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system

16. Secure Ride-Sharing Services Based on a Consortium Blockchain

17. ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map

18. A Secure and Policy-Controlled Signature Scheme With Strong Expressiveness and Privacy-Preserving Policy

19. Secret sharing and duality

20. Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV

21. Advanced attribute-based encryption protocol based on the modified secret sharing scheme

22. An attribute-based keyword search for m-Health networks

23. A New Approach to Verifying and Sharing a Secret QR Code using Elliptic Curves

24. Efficient attribute-based encryption with repeated attributes optimization

25. Attribute-Based Authenticated Group Key Transfer Protocol without Pairing

26. Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets

27. An attribute-based lightweight cloud data access control using hypergraph structure

28. Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System

29. Efficient and Expressive Access Control With Revocation for Privacy of PHR Based on OBDD Access Structure

30. Finding the maximal adversary structure from any given access structure

31. Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption

32. Simplified Ciphertext Policy Attribute Based Encryption for Multimedia Applications

33. Multi-Receiver Authentication Scheme for General Access Structure

34. Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage

35. A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms

37. A Novel Threshold Secret Sharing Scheme for CP-ABE

38. A Survey on Secured Data Sharing using Ciphertext Policy Attribute Based Encryption in Cloud

39. An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage

40. Four classes of minimal binary linear codes with $$w_{min}/w_{max}<1/2$$ derived from Boolean functions

41. Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things

42. Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search

43. Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing

44. How to construct a verifiable multi‐secret sharing scheme based on graded encoding schemes

45. Progressive and hierarchical share-in-share scheme over cloud

46. Verifiably Multiplicative Secret Sharing

47. Traceable-then-revocable ciphertext-policy attribute-based encryption scheme

48. Generalized general access structure in secret image sharing

49. A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation

50. Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR

Catalog

Books, media, physical & digital resources