417 related articles for article (PubMed ID: 29795577)
1. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
Wang S; Ye J; Zhang Y
PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
[TBL] [Abstract][Full Text] [Related]
2. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
Wang S; Zhang X; Zhang Y
PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
[TBL] [Abstract][Full Text] [Related]
3. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
Wang S; Yao L; Zhang Y
PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
[TBL] [Abstract][Full Text] [Related]
4. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
Wang S; Zhao D; Zhang Y
PLoS One; 2017; 12(8):e0183459. PubMed ID: 28859125
[TBL] [Abstract][Full Text] [Related]
5. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
Wang S; Gao T; Zhang Y
PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
[TBL] [Abstract][Full Text] [Related]
6. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
Wang S; Guo K; Zhang Y
PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
[TBL] [Abstract][Full Text] [Related]
7. A searchable personal health records framework with fine-grained access control in cloud-fog computing.
Sun J; Wang X; Wang S; Ren L
PLoS One; 2018; 13(11):e0207543. PubMed ID: 30496194
[TBL] [Abstract][Full Text] [Related]
8. Attribute-based multi-user collaborative searchable encryption in COVID-19.
Zhao F; Peng C; Xu D; Liu Y; Niu K; Tang H
Comput Commun; 2023 May; 205():118-126. PubMed ID: 37128501
[TBL] [Abstract][Full Text] [Related]
9. Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.
Hussien HM; Yasin SM; Udzir NI; Ninggal MIH
Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918266
[TBL] [Abstract][Full Text] [Related]
10. Secure medical information sharing in cloud computing.
Shao Z; Yang B; Zhang W; Zhao Y; Wu Z; Miao M
Technol Health Care; 2015; 23 Suppl 1():S133-7. PubMed ID: 26410315
[TBL] [Abstract][Full Text] [Related]
11. Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms".
Wang S; Zhang Q; Zhang Y; Sun J; Chen J; Sun X
PLoS One; 2019; 14(2):e0212761. PubMed ID: 30802275
[TBL] [Abstract][Full Text] [Related]
12. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
Li J; Peng J; Qiao Z
Big Data; 2022 Apr; ():. PubMed ID: 35417273
[TBL] [Abstract][Full Text] [Related]
13. A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage.
Zhao Y; Xie X; Zhang X; Ding Y
Math Biosci Eng; 2019 May; 16(5):4229-4249. PubMed ID: 31499660
[TBL] [Abstract][Full Text] [Related]
14. m
Miao Y; Ma J; Liu X; Wei F; Liu Z; Wang XA
J Med Syst; 2016 Nov; 40(11):246. PubMed ID: 27696175
[TBL] [Abstract][Full Text] [Related]
15. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
Xiao M; Zhou J; Liu X; Jiang M
Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
[TBL] [Abstract][Full Text] [Related]
16. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.
Guo L; Yau WC
J Med Syst; 2015 Feb; 39(2):11. PubMed ID: 25634700
[TBL] [Abstract][Full Text] [Related]
17. A data-sharing scheme that supports multi-keyword search for electronic medical records.
Niu S; Liu W; Han S; Fang L
PLoS One; 2021; 16(1):e0244979. PubMed ID: 33411842
[TBL] [Abstract][Full Text] [Related]
18. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
Guo C; Zhuang R; Jie Y; Ren Y; Wu T; Choo KR
J Med Syst; 2016 Nov; 40(11):235. PubMed ID: 27653042
[TBL] [Abstract][Full Text] [Related]
19. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
Hwang YW; Lee IY
Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
[TBL] [Abstract][Full Text] [Related]
20. Attribute-based proxy re-encryption with keyword search.
Shi Y; Liu J; Han Z; Zheng Q; Zhang R; Qiu S
PLoS One; 2014; 9(12):e116325. PubMed ID: 25549257
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]