找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security – ESORICS 2021; 26th European Sympos Elisa Bertino,Haya Shulman,Michael Waidner Conference proceedings 2021 Springer Natu

[復(fù)制鏈接]
樓主: Localized
51#
發(fā)表于 2025-3-30 10:57:35 | 只看該作者
52#
發(fā)表于 2025-3-30 12:40:45 | 只看該作者
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacyern leakages. An access pattern leakage is utilized to achieve an ., whereas both access and search pattern leakages are exploited for the .. In this paper, we propose two novel schemes for outsourcing encrypted spatial data supporting dynamic range search. Our proposed schemes leverage R.tree to pa
53#
發(fā)表于 2025-3-30 19:50:59 | 只看該作者
Efficient Multi-client Order-Revealing Encryption and Its Applications018). Further, we present a non-interactive multi-client range query scheme by extending .. Finally, we show a formal security analysis and implement our scheme. The evaluation result demonstrates that . outperforms the scheme by Cash et al. in terms of both query and storage cost while achieving th
54#
發(fā)表于 2025-3-30 21:25:48 | 只看該作者
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstraction has slightly different properties, but provides essentially the same functionality for applications. It makes TRE versatile and can be used beyond HTRE, for instance to construct timed-release functional encryption. Interestingly, it achieves a new . property, which supports that an arbitrary
55#
發(fā)表于 2025-3-31 01:17:53 | 只看該作者
SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environme that transfers encrypted data onto more powerful machines. Furthermore, for resource-constrained IoT devices, the requester can authenticate devices at different levels based on the type of communication. SyLPEnIoT was meticulously designed to run on a gamut of IoT devices, including ultra low-powe
56#
發(fā)表于 2025-3-31 08:26:31 | 只看該作者
Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWEg advantage of it, we then extend our single-hop AB-CPRE into an efficient and concise multi-hop one. No matter how many transformations are performed, the re-encrypted ciphertext is in constant size, and only one encryption/decryption algorithm is needed. Both of our schemes are proved to be select
57#
發(fā)表于 2025-3-31 12:12:40 | 只看該作者
Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Modelcurity for (Attribute-based) proxy re-encryption schemes: security under chosen-plaintext attacks (CPA) and security under chosen-ciphertext attacks (CCA). Both definitions aim to address the security that the delegator enjoys against both proxy and delegatee. Recently, at PKC 19, Cohen points out t
58#
發(fā)表于 2025-3-31 13:48:28 | 只看該作者
Server-Aided Revocable Attribute-Based Encryption Revised: Multi-User Setting and Fully Secure.Unfortunately, current SR-ABE schemes could only be provably secure in one-user setting, which means there’s only one “target user” . with an attribute set . satisfying the access structure . in the challenge ciphertext, i.e., .. However, a more reasonable security model, i.e., multi-user setting,
59#
發(fā)表于 2025-3-31 17:48:07 | 只看該作者
60#
發(fā)表于 2025-3-31 23:08:43 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 20:01
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
开封县| 惠安县| 安阳县| 高淳县| 万载县| 金秀| 青岛市| 乌兰察布市| 同心县| 延津县| 墨玉县| 萨嘎县| 迁安市| 普定县| 宿迁市| 玛沁县| 汤阴县| 全州县| 宝坻区| 团风县| 荃湾区| 星子县| 临夏县| 洪泽县| 阳西县| 普格县| 龙里县| 读书| 五大连池市| 永城市| 库车县| 景洪市| 卢龙县| 和政县| 桂林市| 陆川县| 连平县| 葫芦岛市| 镶黄旗| 巴马| 灵宝市|