173 related articles for article (PubMed ID: 29973569)
1. Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing.
Wu A; Zheng D; Zhang Y; Yang M
Sensors (Basel); 2018 Jul; 18(7):. PubMed ID: 29973569
[TBL] [Abstract][Full Text] [Related]
2. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
Wang S; Yao L; Zhang Y
PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
[TBL] [Abstract][Full Text] [Related]
3. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
Wang S; Gao T; Zhang Y
PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
[TBL] [Abstract][Full Text] [Related]
4. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
Wang S; Zhao D; Zhang Y
PLoS One; 2017; 12(8):e0183459. PubMed ID: 28859125
[TBL] [Abstract][Full Text] [Related]
5. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
Wang S; Zhang X; Zhang Y
PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
[TBL] [Abstract][Full Text] [Related]
6. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
Wang S; Ye J; Zhang Y
PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
[TBL] [Abstract][Full Text] [Related]
7. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
Wang S; Guo K; Zhang Y
PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
[TBL] [Abstract][Full Text] [Related]
8. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
Xiao M; Zhou J; Liu X; Jiang M
Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
[TBL] [Abstract][Full Text] [Related]
9. Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.
Xu Q; Tan C; Fan Z; Zhu W; Xiao Y; Cheng F
Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29772840
[TBL] [Abstract][Full Text] [Related]
10. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Fan K; Wang J; Wang X; Li H; Yang Y
Sensors (Basel); 2017 Jul; 17(7):. PubMed ID: 28737733
[TBL] [Abstract][Full Text] [Related]
11. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
Li J; Peng J; Qiao Z
Big Data; 2022 Apr; ():. PubMed ID: 35417273
[TBL] [Abstract][Full Text] [Related]
12. Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems.
He Z; Chen Y; Luo Y; Zhang L; Tang Y
Entropy (Basel); 2023 Dec; 26(1):. PubMed ID: 38248171
[TBL] [Abstract][Full Text] [Related]
13. A Lightweight CP-ABE Scheme with Direct Attribute Revocation for Vehicular Ad Hoc Network.
Liu Y; Xu S; Yue Z
Entropy (Basel); 2023 Jun; 25(7):. PubMed ID: 37509926
[TBL] [Abstract][Full Text] [Related]
14. Attribute-based proxy re-encryption with keyword search.
Shi Y; Liu J; Han Z; Zheng Q; Zhang R; Qiu S
PLoS One; 2014; 9(12):e116325. PubMed ID: 25549257
[TBL] [Abstract][Full Text] [Related]
15. CESCR: CP-ABE for efficient and secure sharing of data in collaborative ehealth with revocation and no dummy attribute.
Edemacu K; Jang B; Kim JW
PLoS One; 2021; 16(5):e0250992. PubMed ID: 33974672
[TBL] [Abstract][Full Text] [Related]
16. Collaborative Ehealth Privacy and Security: An Access Control With Attribute Revocation Based on OBDD Access Structure.
Edemacu K; Jang B; Kim JW
IEEE J Biomed Health Inform; 2020 Oct; 24(10):2960-2972. PubMed ID: 32071017
[TBL] [Abstract][Full Text] [Related]
17. Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption.
Al-Dahhan RR; Shi Q; Lee GM; Kifayat K
Sensors (Basel); 2019 Apr; 19(7):. PubMed ID: 30970678
[TBL] [Abstract][Full Text] [Related]
18. Attribute-based multi-user collaborative searchable encryption in COVID-19.
Zhao F; Peng C; Xu D; Liu Y; Niu K; Tang H
Comput Commun; 2023 May; 205():118-126. PubMed ID: 37128501
[TBL] [Abstract][Full Text] [Related]
19. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
Obour Agyekum KO; Xia Q; Sifah EB; Gao J; Xia H; Du X; Guizani M
Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30862110
[TBL] [Abstract][Full Text] [Related]
20. m
Miao Y; Ma J; Liu X; Wei F; Liu Z; Wang XA
J Med Syst; 2016 Nov; 40(11):246. PubMed ID: 27696175
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]