Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,â€Proc. 13th ACM Conf. Computer and Comm. Security (CCS ‟ 06),pp. 89-98, 2006. [2] Ming LiShucheng Yu, Yao Zheng,Kui Ren, and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using AttributeBased Encryptionâ€, IEEE transactions on parallel and distributed systems, vol. 24, no. 1, january 2013. [3] Y. Zheng, “Privacy-Preserving Personal Health Record System Using Attribute-Based Encryptionâ€, master‟ s thesis, Worcester Polytechnic Inst., 2011. [4] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributesâ€, 2009. [5] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,†Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS ‟ 10), 2010. [6] S. Narayan, M. Gagne´, and R. Safavi-Naini, “Privacy Preserving EHR System Using Attribute-Based Infrastructureâ€, Proc. ACM Cloud Computing Security Workshop (CCSW ‟ 10), pp. 47-52, 2010. [7] J. Bethencourt, A. Sahai, and B. Waters, “CiphertextPolicy Attribute-Based Encryptionâ€, Proc. IEEE Symp. Security and Privacy (SP ‟ 07), pp. 321-334, 2007. [8] Q.Wang et al.,“Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing,†Proc. ESORICS „09, Sept. 2009, pp. 355–70. [9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,†in IEEE INFOCOM‟ 10, 2010. [10] A. Boldyreva, V. Goyal, and V. Kumar, “Identitybased encryption with efficient revocation,†in ACM CCS, ser. CCS ‟ 08, 2008, pp.417–426. [11] J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,†IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. PrePrints, 2010 [12] J. Bethencourt, A. Sahai, and B. Waters,“Ciphertext-policy attribute-based encryption,†in IEEE S& P ’07, 2007, pp. 321–334. [13] Melissa Chase “Multi-authority Attribute based Encryption,†Computer Science Department Brown University Providence, RI 02912
![]() | V2I1005.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|