共 20 条
- [1] Rivera D., Garcia A., Martin-Ruiz M.L., Et al., Secure communications and protected data for a Internet of things smart toyplatform, IEEE Internet of Things Journal, 6, 2, pp. 3785-3795, (2019)
- [2] Sahaia, Waters B., Fuzzy identity-based encryption, Annual International Conference on Theory and Applications of Cryptographic Tchniques, pp. 457-473, (2005)
- [3] Waters B., Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, International Workshop on Public Key Cryptography, pp. 321-334, (2008)
- [4] Bethencourt J., Sahai A., Waters B., Ciphertext-policy attribute-based encryption, IEEE Symposium on Security and Privacy, pp. 321-334, (2007)
- [5] Luan I., Petkovic M., Nikova S., Et al., Mediated ciphertext-policy attribute-based encryption and its application, Information Security Applications, 10th International Workshop, pp. 309-323, (2009)
- [6] Yu S., Wang C., Ren K., Et al., Attribute based data sharing with attribute revocation, TheInternational Symposium on ACM Symposium on Information, Computer and Communications Security, pp. 261-270, (2010)
- [7] Wu X., Jiang R., Bhargava B., On the security of data access control for multiauthority cloud storage systems, IEEE Transactions on Services Computing, 10, 2, pp. 272-285, (2015)
- [8] Fan K., Wang J., Wang X., Et al., Secure, efficient and revocable data sharing scheme for vehicular fogs, Peer-to-Peer Networking and Applications, 11, 4, pp. 766-777, (2018)
- [9] Li J., Yao W., Zhang Y., Et al., Flexible and fine-grained attribute-based data storage in cloud computing, IEEE Transactions on Services Computing, 10, 5, pp. 785-796, (2016)
- [10] Fan K., Wang J., Wang X., Et al., Proxy-assisted access control scheme of cloud data for smart cities, Personal & Ubiquitous Computing, 21, 5, pp. 937-947, (2017)