Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CP-ABE
biblio
A CP-ABE Scheme Supporting Attribute Revocation and Policy Hiding in Outsourced Environment
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
attribute base encryption
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
policy hiding
outsourced environment
mobile terminals
mobile end
lightweight decryption
data outsourcing (key words)
CP-ABE scheme
component
attributes revocation
attribute revocation
Ciphers
algorithm analysis
CP-ABE
policy-based governance
pubcrawl
outsourcing
Scalability
Servers
authorisation
Access Control
encryption
Cryptography
biblio
Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
single cloud environment
cloud storage service
CP-ABE algorithm
multi-cloud
multicloud architecture
multicloud CP-ABE
privacy leakage
Privacy-preserving
privacy-preserving CP-ABE access control scheme
share data
cloud storage environment
single cloud scheme
single-cloud CP-ABE
suitable security access control technology
user attribute set
user collusion attack
user data
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
collaboration
pubcrawl
encryption
Access Control
authorisation
Cloud Computing
data privacy
Servers
Scalability
storage management
privacy
Cryptography
policy-based governance
CP-ABE
encryption scheme
access control overhead
access policy tree
achieving privacy-preserving CP-ABE access control
ciphertext-policy
cloud storage
biblio
CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Safety
malicious attacks
platoon key
platoon maneuvers
platoon secure sensing scheme
platoon stability
policy-based governance
polynomial time solution
position information
Public key
LTE-V2X
Scalability
security insurance
sensing data
sensors
Stability analysis
traffic efficiency
traffic engineering computing
Veins platform
Cryptography
Access Control
access control structure
authorisation
Cloud Computing
collaboration
computational complexity
CP-ABE
CP-ABE based platoon
CPSS
pubcrawl
cyber-attacks
cyphertext-policy attribute-based encryption
distance fluctuations
driving applications
encryption
Gold
key distribution process
life-threatening accidents
biblio
Authorization of Searchable CP-ABE Scheme with Attribute Revocation in Cloud Computing
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
data user
user attribute
Servers
searchable CP-ABE scheme
searchable attribute-based encryption schemes
Scalability
revocation stage
Public key
pubcrawl
provable security
policy-based governance
multi-keyword search
encryption
attribute revocation
data privacy
Cryptography
CP-ABE
collaboration
cloud service provider
cloud computing environment
Cloud Computing
ciphertext information
authorization server
authorization information
authorization
authorisation
biblio
Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Indexes
text analysis
searchable encryption
Scalability
ranked search
pubcrawl
program testing
policy-based governance
multikeyword ranked searchable encryption
multi-keyword search
IoT devices
Internet of Things
ciphertext searching
Frequency modulation
encryption
encrypted data
data privacy
Cryptography
CP-ABE test
CP-ABE
collaboration
Cloud Computing
ciphertext-policy attribute-based encryption test
ciphertext-policy attribute-based encryption
biblio
An Attribute Revocable CP-ABE Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Cloud Computing
Subset Cover
storage management
Scalability
RCP-ABE scheme
pubcrawl
policy-based governance
fine-grained attributes
Cryptography
CP-ABE
collaboration
cloud storage environment
Access Control
ciphertext storage
ciphertext sharing
ciphertext policy
ciphertext access control
Big Data
authorisation
attribute revocation
attribute revocable CP-ABE scheme
attribute encryption scheme CP-ABE
attribute encryption
biblio
Facing parallel market and counterfeit issues by the combined use of blockchain and CP-ABE encryption technologies
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
distributed fashion
value propositions
user experience
Small & Medium Enterprises
Scalability
pubcrawl
provision trusted information
product tagging solution
product tagging
policy-based governance
parallel market
financial data processing
ethereum
DLT
blockchain
Distributed databases
cryptocurrency purposes
cryptocurrencies
CP-ABE encryption technique
CP-ABE
counterfeit products
counterfeit issues
collaboration
business models
brand protection
brand
blockchains
biblio
CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
data structures
Servers
security threats
Scalability
pubcrawl
policy-based governance
NDN environment
NDN
named data networking
information-centric networking
information caching
ICN project
hash table data structure
hash table
fine-grained access control
encryption
Access Control
data segmentation
data privacy
data management
Cryptography
CP-ABE access control scheme
CP-ABE
content publishers
content distribution
computer network security
collaboration
CipherText Policy Attribute Based Encryption
CHTDS
automation
authorisation
biblio
A Flexible Secure Key Delegation Mechanism for CP-ABE with Hidden Access Structure
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
hidden access policy
unauthorized data access
storage management
specified access control
Scalability
Public key
pubcrawl
policy-based governance
Organizations
Logic gates
key delegation
hidden access structure
Access Control
Generators
flexible secure key delegation mechanism
fine grained access control
encryption
Cryptography
CP-ABE schemes
CP-ABE
collaboration
ciphertext policy attribute
authorisation
anonymity
biblio
Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
Internet of Things
valid users
scalable revocation
Scalability
resource-constrained IoT devices
resource constraints
related schemes
pubcrawl
portable devices
policy-based governance
mobile-based selective sharing
mobile computing
malicious users
IoT
Internet of Things device
authorisation
Cryptography
CP-ABE
constant size CP-ABE
constant number
constant ciphertext length CP-ABE scheme
constant ciphertext
constant cipher-text
collaboration
ciphertext-policy attribute encryption scheme
chosen ciphertext attack secure
CCA-secure
CCA secure proxy-based scalable revocation
C-PROSRCC scheme
« first
‹ previous
1
2
3
4
5
6
next ›
last »