共 12 条
[1]
An Attribute-Based Encryption Scheme to Secure Fog Communications
[J].
IEEE ACCESS,
2017, 5
:9131-9138
[2]
BETHENCOURT J, 2011, ADV CRYPTO SOFTWARE
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Bonomi F., 2012, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]
[5]
On Ends-to-Ends Encryption Asynchronous Group Messaging with Strong Security Guarantees
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:1802-1819
[10]
An efficient access control scheme with outsourcing capability and attribute update for fog computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 78
:753-762