共 72 条
[41]
Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
[J].
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS,
2013, 7 (06)
:385-394
[42]
Lin H, 2008, LECT NOTES COMPUT SC, V5365, P426
[43]
A scheme of hidden-structure attribute-based encryption with multiple authorities
[J].
INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION AND AUTOMATION ENGINEERING,
2018, 359
[44]
Secure and fine-grained access control on e-healthcare records in mobile cloud computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 78
:1020-1026
[45]
Liu Z, 2011, LECT NOTES COMPUT SC, V6879, P278, DOI 10.1007/978-3-642-23822-2_16
[46]
Mete V.I., 2016, International Research Journal of Engineering and Technology (IRJET), V3, P1740
[47]
More M., 2017, International Journal of Advance Research, Ideas and Innovations in Technology, vol, V3, P1220
[50]
Rudra D.V., 2018, International Journal of Innovative Research in Science, Engineering and Technology vol, V7, P90