共 50 条
- [1] Attribute-based encryption with Hidden access structures [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (02): : 457 - 461
- [2] Efficient Revocable Attribute-Based Encryption with Hidden Policies [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1638 - 1645
- [4] Efficient attribute-based encryption with hidden access structures [J]. Xi'an Dianzi Keji Daxue Xuebao, 3 (97-102):
- [5] HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 16 (01): : 93 - 114
- [6] Mining Attribute-Based Access Control Policies [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
- [9] Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures [J]. COMPUTER JOURNAL, 2019, 62 (12): : 1748 - 1760