共 50 条
- [41] Oblivious Transfer with Hidden Access Control Policies [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 192 - +
- [43] Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 196 - 210
- [44] CRYPTOGRAPHIC ACCESS CONTROL FOR MANDATORY SECURITY POLICIES USING ATTRIBUTE-BASED ENCRYPTION [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2017, 18 : 413 - 429
- [45] Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage [J]. 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 205 - 212
- [47] Secure Cloud Storage Model with Hidden Policy Attribute based Access Control [J]. 2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
- [48] An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures [J]. PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 19 - 38
- [49] Issuer-Hiding Attribute-Based Credentials [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2021, 2021, 13099 : 158 - 178
- [50] Monotonicity and Completeness in Attribute-Based Access Control [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48