找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security – ESORICS 2021; 26th European Sympos Elisa Bertino,Haya Shulman,Michael Waidner Conference proceedings 2021 Springer Natu

[復(fù)制鏈接]
樓主: Localized
51#
發(fā)表于 2025-3-30 10:57:35 | 只看該作者
52#
發(fā)表于 2025-3-30 12:40:45 | 只看該作者
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacyern leakages. An access pattern leakage is utilized to achieve an ., whereas both access and search pattern leakages are exploited for the .. In this paper, we propose two novel schemes for outsourcing encrypted spatial data supporting dynamic range search. Our proposed schemes leverage R.tree to pa
53#
發(fā)表于 2025-3-30 19:50:59 | 只看該作者
Efficient Multi-client Order-Revealing Encryption and Its Applications018). Further, we present a non-interactive multi-client range query scheme by extending .. Finally, we show a formal security analysis and implement our scheme. The evaluation result demonstrates that . outperforms the scheme by Cash et al. in terms of both query and storage cost while achieving th
54#
發(fā)表于 2025-3-30 21:25:48 | 只看該作者
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstraction has slightly different properties, but provides essentially the same functionality for applications. It makes TRE versatile and can be used beyond HTRE, for instance to construct timed-release functional encryption. Interestingly, it achieves a new . property, which supports that an arbitrary
55#
發(fā)表于 2025-3-31 01:17:53 | 只看該作者
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environme that transfers encrypted data onto more powerful machines. Furthermore, for resource-constrained IoT devices, the requester can authenticate devices at different levels based on the type of communication. SyLPEnIoT was meticulously designed to run on a gamut of IoT devices, including ultra low-powe
56#
發(fā)表于 2025-3-31 08:26:31 | 只看該作者
Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWEg advantage of it, we then extend our single-hop AB-CPRE into an efficient and concise multi-hop one. No matter how many transformations are performed, the re-encrypted ciphertext is in constant size, and only one encryption/decryption algorithm is needed. Both of our schemes are proved to be select
57#
發(fā)表于 2025-3-31 12:12:40 | 只看該作者
Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Modelcurity for (Attribute-based) proxy re-encryption schemes: security under chosen-plaintext attacks (CPA) and security under chosen-ciphertext attacks (CCA). Both definitions aim to address the security that the delegator enjoys against both proxy and delegatee. Recently, at PKC 19, Cohen points out t
58#
發(fā)表于 2025-3-31 13:48:28 | 只看該作者
Server-Aided Revocable Attribute-Based Encryption Revised: Multi-User Setting and Fully Secure.Unfortunately, current SR-ABE schemes could only be provably secure in one-user setting, which means there’s only one “target user” . with an attribute set . satisfying the access structure . in the challenge ciphertext, i.e., .. However, a more reasonable security model, i.e., multi-user setting,
59#
發(fā)表于 2025-3-31 17:48:07 | 只看該作者
60#
發(fā)表于 2025-3-31 23:08:43 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 03:17
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
改则县| 漳州市| 四子王旗| 重庆市| 抚顺市| 重庆市| 镇雄县| 奉节县| 朝阳区| 重庆市| 武汉市| 邯郸市| 巴林右旗| 临城县| 东台市| 九龙坡区| 永胜县| 涪陵区| 萝北县| 阿拉善左旗| 麦盖提县| 城固县| 京山县| 哈尔滨市| 吉林市| 庆阳市| 建瓯市| 崇州市| 锡林浩特市| 六盘水市| 如皋市| 哈密市| 永吉县| 松滋市| 平邑县| 平远县| 马关县| 梓潼县| 柳江县| 东明县| 洞头县|