共 27 条
[1]
An Attribute-Based Encryption Scheme to Secure Fog Communications
[J].
IEEE ACCESS,
2017, 5
:9131-9138
[2]
[Anonymous], IEEE T INFORM FORENS
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Cheng-Chi Lee, 2013, International Journal of Network Security, V15, P231
[5]
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[6]
Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI DOI 10.1145/1180405.1180418
[7]
Ibraimi L, 2009, LECT NOTES COMPUT SC, V5451, P1, DOI 10.1007/978-3-642-00843-6_1
[8]
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 78
:720-729
[9]
Jung T., 2014, IEEE T INF FORENSICS
[10]
Li HW, 2009, LECT NOTES COMPUT SC, V5931, P157