找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security – ESORICS 2021; 26th European Sympos Elisa Bertino,Haya Shulman,Michael Waidner Conference proceedings 2021 Springer Natu

[復(fù)制鏈接]
樓主: Localized
51#
發(fā)表于 2025-3-30 10:57:35 | 只看該作者
52#
發(fā)表于 2025-3-30 12:40:45 | 只看該作者
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacyern leakages. An access pattern leakage is utilized to achieve an ., whereas both access and search pattern leakages are exploited for the .. In this paper, we propose two novel schemes for outsourcing encrypted spatial data supporting dynamic range search. Our proposed schemes leverage R.tree to pa
53#
發(fā)表于 2025-3-30 19:50:59 | 只看該作者
Efficient Multi-client Order-Revealing Encryption and Its Applications018). Further, we present a non-interactive multi-client range query scheme by extending .. Finally, we show a formal security analysis and implement our scheme. The evaluation result demonstrates that . outperforms the scheme by Cash et al. in terms of both query and storage cost while achieving th
54#
發(fā)表于 2025-3-30 21:25:48 | 只看該作者
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstraction has slightly different properties, but provides essentially the same functionality for applications. It makes TRE versatile and can be used beyond HTRE, for instance to construct timed-release functional encryption. Interestingly, it achieves a new . property, which supports that an arbitrary
55#
發(fā)表于 2025-3-31 01:17:53 | 只看該作者
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environme that transfers encrypted data onto more powerful machines. Furthermore, for resource-constrained IoT devices, the requester can authenticate devices at different levels based on the type of communication. SyLPEnIoT was meticulously designed to run on a gamut of IoT devices, including ultra low-powe
56#
發(fā)表于 2025-3-31 08:26:31 | 只看該作者
Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWEg advantage of it, we then extend our single-hop AB-CPRE into an efficient and concise multi-hop one. No matter how many transformations are performed, the re-encrypted ciphertext is in constant size, and only one encryption/decryption algorithm is needed. Both of our schemes are proved to be select
57#
發(fā)表于 2025-3-31 12:12:40 | 只看該作者
Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Modelcurity for (Attribute-based) proxy re-encryption schemes: security under chosen-plaintext attacks (CPA) and security under chosen-ciphertext attacks (CCA). Both definitions aim to address the security that the delegator enjoys against both proxy and delegatee. Recently, at PKC 19, Cohen points out t
58#
發(fā)表于 2025-3-31 13:48:28 | 只看該作者
Server-Aided Revocable Attribute-Based Encryption Revised: Multi-User Setting and Fully Secure.Unfortunately, current SR-ABE schemes could only be provably secure in one-user setting, which means there’s only one “target user” . with an attribute set . satisfying the access structure . in the challenge ciphertext, i.e., .. However, a more reasonable security model, i.e., multi-user setting,
59#
發(fā)表于 2025-3-31 17:48:07 | 只看該作者
60#
發(fā)表于 2025-3-31 23:08:43 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 03:17
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
米易县| 凤庆县| 延川县| 萍乡市| 泰州市| 千阳县| 丰镇市| 绩溪县| 长汀县| 聂拉木县| 北川| 康平县| 巴林左旗| 北安市| 金平| 寻甸| 荣昌县| 喀什市| 星子县| 景泰县| 廊坊市| 昌江| 东乌珠穆沁旗| 西宁市| 谢通门县| 乌兰浩特市| 吴堡县| 白朗县| 新丰县| 修文县| 吴旗县| 伽师县| 吴旗县| 中山市| 五莲县| 永兴县| 萝北县| 娄烦县| 曲水县| 临清市| 武山县|