Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Attribute‐Key Attack Against a Class of Key Generation Algorithm Frameworks
Sun, Keshuo, Gao, Haiying, Hu, Bin, Zhou, Aoyang, Zhao, Xiufeng
Published in Concurrency and computation (25.09.2025)
Published in Concurrency and computation (25.09.2025)
Get full text
Journal Article
Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
Naruse, Takeru, Mohri, Masami, Shiraishi, Yoshiaki
Published in Human-centric computing and information sciences (22.03.2015)
Published in Human-centric computing and information sciences (22.03.2015)
Get full text
Journal Article
Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms”
Wang, Shangping, Zhang, Qian, Zhang, Yaling, Sun, Jin, Chen, Juanjuan, Sun, Xiaoqing
Published in PloS one (25.02.2019)
Published in PloS one (25.02.2019)
Get full text
Journal Article
Key defense node set selection method and system based on attribute attack graph
SUN YANBIN, TIAN ZHIHONG, ZHOU JIAYU, CAI XIAO, LV PIN, DONG CHONGWU, LI MOHAN, LIU DEHUI
Year of Publication 31.12.2024
Get full text
Year of Publication 31.12.2024
Patent
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack
Li, Jiguo, Wang, Min, Lu, Yang, Zhang, Yichen, Wang, Huaqun
Published in Computer standards and interfaces (01.02.2021)
Published in Computer standards and interfaces (01.02.2021)
Get full text
Journal Article
Enhancing Privacy-Preserving Multi-Authority Attribute-Based Encryption: Addressing Rogue-Key Attacks Under Adaptive Corruption of Authorities
Zhang, Jingchi, Datta, Anwitama
Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (17.12.2024)
Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (17.12.2024)
Get full text
Conference Proceeding
Toward inference attacks for k-anonymity
Sun, Yan, Yin, Lihua, Liu, Licai, Xin, Shuang
Published in Personal and ubiquitous computing (01.12.2014)
Published in Personal and ubiquitous computing (01.12.2014)
Get full text
Journal Article
Conference Proceeding
Efficient Revocable Attribute-Based Keyword Search Against Keyword Guessing Attack
Zhu, Chen, Ding, Jiale, Wei, Xingrui, Lu, Yang, Sun, Yinxia
Published in Proceedings (International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. Online) (24.10.2024)
Published in Proceedings (International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. Online) (24.10.2024)
Get full text
Conference Proceeding
Multi-message multi-receiver signcryption scheme based on blockchain
Yang, Xiao Dong, Wang, Wen Jia, Shu, Bin, Li, Mei Juan, Liu, Rui Xia, Wang, Cai Fen
Published in Mathematical biosciences and engineering : MBE (01.01.2023)
Published in Mathematical biosciences and engineering : MBE (01.01.2023)
Get full text
Journal Article
A Mutual Authentication Framework for Wireless Medical Sensor Networks
Srinivas, Jangirala, Mishra, Dheerendra, Mukhopadhyay, Sourav
Published in Journal of medical systems (01.05.2017)
Published in Journal of medical systems (01.05.2017)
Get full text
Journal Article
A Secure Attribute-Based Keyword Search Scheme Against Keyword Guessing And Chosen Keyword Attack
Vahid Yousefipoor, Mohammad Hassan Ameri, Javad Mohajeri, Taraneh Eghlidos
Published in International Journal of Information and Communication Technology Research (Tehran.Print) (01.03.2018)
Get full text
Published in International Journal of Information and Communication Technology Research (Tehran.Print) (01.03.2018)
Journal Article