找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security – ESORICS 2021; 26th European Sympos Elisa Bertino,Haya Shulman,Michael Waidner Conference proceedings 2021 Springer Natu

[復(fù)制鏈接]
樓主: Localized
51#
發(fā)表于 2025-3-30 10:57:35 | 只看該作者
52#
發(fā)表于 2025-3-30 12:40:45 | 只看該作者
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacyern leakages. An access pattern leakage is utilized to achieve an ., whereas both access and search pattern leakages are exploited for the .. In this paper, we propose two novel schemes for outsourcing encrypted spatial data supporting dynamic range search. Our proposed schemes leverage R.tree to pa
53#
發(fā)表于 2025-3-30 19:50:59 | 只看該作者
Efficient Multi-client Order-Revealing Encryption and Its Applications018). Further, we present a non-interactive multi-client range query scheme by extending .. Finally, we show a formal security analysis and implement our scheme. The evaluation result demonstrates that . outperforms the scheme by Cash et al. in terms of both query and storage cost while achieving th
54#
發(fā)表于 2025-3-30 21:25:48 | 只看該作者
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstraction has slightly different properties, but provides essentially the same functionality for applications. It makes TRE versatile and can be used beyond HTRE, for instance to construct timed-release functional encryption. Interestingly, it achieves a new . property, which supports that an arbitrary
55#
發(fā)表于 2025-3-31 01:17:53 | 只看該作者
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environme that transfers encrypted data onto more powerful machines. Furthermore, for resource-constrained IoT devices, the requester can authenticate devices at different levels based on the type of communication. SyLPEnIoT was meticulously designed to run on a gamut of IoT devices, including ultra low-powe
56#
發(fā)表于 2025-3-31 08:26:31 | 只看該作者
Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWEg advantage of it, we then extend our single-hop AB-CPRE into an efficient and concise multi-hop one. No matter how many transformations are performed, the re-encrypted ciphertext is in constant size, and only one encryption/decryption algorithm is needed. Both of our schemes are proved to be select
57#
發(fā)表于 2025-3-31 12:12:40 | 只看該作者
Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Modelcurity for (Attribute-based) proxy re-encryption schemes: security under chosen-plaintext attacks (CPA) and security under chosen-ciphertext attacks (CCA). Both definitions aim to address the security that the delegator enjoys against both proxy and delegatee. Recently, at PKC 19, Cohen points out t
58#
發(fā)表于 2025-3-31 13:48:28 | 只看該作者
Server-Aided Revocable Attribute-Based Encryption Revised: Multi-User Setting and Fully Secure.Unfortunately, current SR-ABE schemes could only be provably secure in one-user setting, which means there’s only one “target user” . with an attribute set . satisfying the access structure . in the challenge ciphertext, i.e., .. However, a more reasonable security model, i.e., multi-user setting,
59#
發(fā)表于 2025-3-31 17:48:07 | 只看該作者
60#
發(fā)表于 2025-3-31 23:08:43 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 20:01
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
遂平县| 苏尼特左旗| 霍林郭勒市| 东光县| 鲁甸县| 托里县| 西峡县| 屏南县| 廊坊市| 澜沧| 田阳县| 阳原县| 新巴尔虎右旗| 富阳市| 象山县| 金堂县| 屯留县| 宜君县| 巴彦淖尔市| 永仁县| 常熟市| 六盘水市| 宜章县| 利辛县| 阿坝| 无棣县| 咸阳市| 清苑县| 惠东县| 宁武县| 邵东县| 阿坝县| 大姚县| 治多县| 茌平县| 垫江县| 洛隆县| 调兵山市| 黄冈市| 江口县| 湘西|