Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:CSS (11. : 2019 : Kanton, Stadt) Cyberspace safety and security ; Part 2
1. Verfasser: Yao, Wang (VerfasserIn)
Weitere Verfasser: Wu, Faguo (VerfasserIn), Zhang, Xiao (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2019
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
DDOS Multivariate Information Fusion Model Based on Hierarchical Representation Learning 2019 Tang, Xiangyan
DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models 2019 Kuang, Xiaohui
Security Solution Based on Raspberry PI and IoT 2019 Ali, Bahast
Design of Anonymous Communication Protocol Based on Group Signature 2019 Zhu, Haojia
Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption 2019 Yao, Wang
An Efficient Property-Based Authentication Scheme in the Standard Model 2019 Yue, An Xiaohan
Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme 2019 Li, Ping
Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing 2019 Liu, Zhenhua
Facial Localization Based on Skin Color Modeling 2019 Li, Wei
A Textual Password Entry Method Resistant to Human Shoulder-Surfing Attack 2019 Chen, Shudi
Cyclic DenseNet for Tumor Detection and Identification 2019 Jiang, Di
Explaining Concept Drift of Deep Learning Models 2019 Wang, Xiaolu
Dummy Trajectory Generation Scheme Based on Deep Learning 2019 Pan, Jiaji
Body-Weight Estimation of Plateau Yak with Simple Dimensional Measurement 2019 Zhang, Yu-an
Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats 2019 Shi, Lei
Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural Network 2019 Liu, Yifu
DDos Attack Detection Method Based on V-Support Vector Machine 2019 Tang, Xiangyan
A Confidence-Guided Anomaly Detection Approach Jointly Using Multiple Machine Learning Algorithms 2019 Xie, Xueshuo
Malicious Intentions: Android Internet Permission Security Risks 2019 Andah, John Mark
Research on K-Means Clustering Algorithm Over Encrypted Data 2019 Wang, Chen
Alle Artikel auflisten