119 related articles for article (PubMed ID: 34695133)
1. New constructions of equality test scheme for cloud-assisted wireless sensor networks.
Zhu H; Xie D; Ahmad H; Hasan Abdullah HN
PLoS One; 2021; 16(10):e0258746. PubMed ID: 34695133
[TBL] [Abstract][Full Text] [Related]
2. Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Liao Y; He Y; Li F; Jiang S; Zhou S
Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29320418
[TBL] [Abstract][Full Text] [Related]
3. Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization.
Li N
Entropy (Basel); 2023 Feb; 25(2):. PubMed ID: 36832728
[TBL] [Abstract][Full Text] [Related]
4. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
Wang S; Ye J; Zhang Y
PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
[TBL] [Abstract][Full Text] [Related]
5. P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing.
Huang Q; Yue W; Yang Y; Chen L
IEEE/ACM Trans Comput Biol Bioinform; 2022; 19(4):2385-2398. PubMed ID: 33656996
[TBL] [Abstract][Full Text] [Related]
6. Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing.
Li W; Liu BM; Liu D; Liu RP; Wang P; Luo S; Ni W
IEEE J Biomed Health Inform; 2019 May; 23(3):1278-1289. PubMed ID: 29994490
[TBL] [Abstract][Full Text] [Related]
7. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.
Guo L; Yau WC
J Med Syst; 2015 Feb; 39(2):11. PubMed ID: 25634700
[TBL] [Abstract][Full Text] [Related]
8. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
Wang S; Guo K; Zhang Y
PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
[TBL] [Abstract][Full Text] [Related]
9. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.
Wang S; Zhang X; Zhang Y
PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703
[TBL] [Abstract][Full Text] [Related]
10. Identity-Based Encryption with Filtered Equality Test for Smart City Applications.
Ming Y; Wang E
Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31295922
[TBL] [Abstract][Full Text] [Related]
11. Lightweight Fine-Grained Access Control for Wireless Body Area Networks.
Ali M; Sadeghi MR; Liu X
Sensors (Basel); 2020 Feb; 20(4):. PubMed ID: 32079301
[TBL] [Abstract][Full Text] [Related]
12. Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms".
Wang S; Zhang Q; Zhang Y; Sun J; Chen J; Sun X
PLoS One; 2019; 14(2):e0212761. PubMed ID: 30802275
[TBL] [Abstract][Full Text] [Related]
13. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.
Khan MK; Alghathbar K
Sensors (Basel); 2010; 10(3):2450-9. PubMed ID: 22294935
[TBL] [Abstract][Full Text] [Related]
14. Data Division Scheme Based on Homomorphic Encryption in WSNs for Health Care.
Wang X; Zhang Z
J Med Syst; 2015 Dec; 39(12):188. PubMed ID: 26490146
[TBL] [Abstract][Full Text] [Related]
15. Traceable Scheme of Public Key Encryption with Equality Test.
Zhu H; Xue Q; Li T; Xie D
Entropy (Basel); 2022 Feb; 24(3):. PubMed ID: 35327820
[TBL] [Abstract][Full Text] [Related]
16. Privacy Protection and Intrusion Detection System of Wireless Sensor Network Based on Artificial Neural Network.
Shi L; Li K
Comput Intell Neurosci; 2022; 2022():1795454. PubMed ID: 35785102
[TBL] [Abstract][Full Text] [Related]
17. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
Wang S; Gao T; Zhang Y
PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
[TBL] [Abstract][Full Text] [Related]
18. Backward Compatible Identity-Based Encryption.
Kim J
Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177384
[TBL] [Abstract][Full Text] [Related]
19. Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme.
Dawson JK; Twum F; Hayfron Acquah JB; Missah YM
PLoS One; 2023; 18(2):e0274628. PubMed ID: 36758028
[TBL] [Abstract][Full Text] [Related]
20. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images.
Geng Q; Yan H; Lu X
Comput Intell Neurosci; 2022; 2022():3394475. PubMed ID: 35300398
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]