Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
KP-ABE
biblio
Collaborative KP-ABE for cloud-based Internet of Things applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
Internet of Things
Trusted Computing
trusted assistant nodes
storage management
storage capacities
Servers
sensors
security scheme
Scalability
resource-limited networks
pubcrawl
policy-based governance
Performance analysis
KP-ABE
key-policy attribute-based encryption
key policy attribute based encryption
Access Control
encryption
Cryptography
cryptographic scheme
computer network security
collaborative KP-ABE
collaboration
cloud-based IoT applications
cloud-based Internet of Things applications
cloud servers
cloud resources
Cloud Computing
C-KP-ABE
authorisation
Asymmetric Encryption
access control solutions
biblio
Grouping-Proofs Based Access Control Using KP-ABE for IoT Applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:31am
KP-ABE
threshold grouping-proofs
Security analysis
Scalability
RFID systems
radiofrequency identification
Public key
pubcrawl
policy-based governance
Pairing Cryptography
message encryption
KP-ABE protocol
Access Control
key-policy attribute-based encryption
key policy attribute based encryption
IoT applications
Internet of Things
grouping-proofs based access control
Grouping proofs
encryption
Cryptographic Protocols
collaboration
authorize NFC payment
authorisation
biblio
Comparative study on KP-ABE and CP-ABE algorithm for secure data retrieval in military network
Submitted by grigby1 on Fri, 07/24/2020 - 11:31am
Key Managements
war zone
secure data retrieval
Scalability
remote devices
reliable data transmission
Reliability
pubcrawl
policy-based governance
military network
military computing
military communication
KP-ABE
key revocation
key policy attribute based encryption
attribute based encryption
Key Escrow
encryption
Disruption-Tolerant systems
disruption-tolerant networks
Decentralized Networks
Cryptography
CP-ABE algorithm
computer science
computer network reliability
collaboration
cipher text approach
authorisation
Attribute Revocation and Attribute Based Encryption
biblio
KP-ABE Based Verifiable Cloud Access Control Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 11:31am
mobile internet
XACML policy
XACML
verifiable computation
user private key revocable key policy attribute based encryption scheme
Scalability
public verifiable computation protocol
public verifiable cloud access control scheme
Public key
pubcrawl
private key cryptography
policy-based governance
nonmonotonic access structure
Access Control
mobile devices
mobile computing
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Games
encoding
collaboration
Cloud Computing
authorization policy
authorisation
biblio
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 11:31am
central authority
collaboration
user collusion avoidance
Resists
privacy-preserving decentralized KP-ABE
key policy
decisional bilinear Diffie-Hellman assumption
decentralized KP-ABE scheme
decentralized KP ABE scheme
decentralized key policy ABE schemes
Decentralized attribute-based encryption
DBDH assumption
collusion attack
encryption
attributed-based encryption
KP-ABE
key policy attribute based encryption
policy-based governance
pubcrawl
public key cryptography
Generators
privacy
Scalability
Public key
data privacy
authorisation
« first
‹ previous
1
2