Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
1. J. Bethencourt, A. Sahai, and B. Waters, “CiphertextPolicy AttributeBased Encryption,†Proc. IEEE Symp. Security and Privacy (SP ’07), pp. 321-334, 2007. 2. P. Mell and T. Grance, „„The NIST Definition of Cloud Computing,‟ ‟ National Institute of Standards and Technology, Gaithersburg, MD, USA, Tech. Rep., 2009. 3. A.B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B.Waters, „Fully Secure Functional Encryption: AttributeBased Encryption and (Hierarchical) Inner Product Encryption,‟ ‟ in Proc. Advances in cryptologyEUROCRYPT’10, 2010, pp. 62-91. 4. M. Li, S. Yu, Y. Zheng, K. Ren, andW. Lou, „„Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption,‟ ‟ IEEE Trans. Parallel Distributed Systems, vol. 24, no. 1, pp. 131-143, Jan. 2013. 5. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,†Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS ’10), 2010. 6. J. Hur and D. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,†IEEE Transactions on Parallel and Distributed Systems, 2010. 7. S. Ruj, A. Nayak, and I. Stojmenovic, „„DACC: Distributed Access Control in Clouds,‟ ‟ in Proc. 10th IEEE Int’l Conf. TrustCom, 2011, pp. 91-98 8. G. Wang, Q. Liu, and J. Wu, “Hierarchical attributebased encryption for fine-grained access control in cloud storage services,†in ACM Conference on Computer and Communications Security, E. Al-Shaer, A. D. Keromytis, and V. Shmatikov, Eds. ACM, 2010, pp. 735–737. 9. C. Dong, G. Russello, and N. Dulay, “Shared and Searchable Encrypted Data for Untrusted Servers,†J. Computer Security, vol. 19, pp. 367- 397, 2010. 10. D. Boneh and M.K. Franklin, „„Identity-Based Encryption from the Weil Pairing,‟ ‟ in Proc. 21st Ann. Int’l Cryptology Conf.: Advances in Cryptology - CRYPTO’01, 2001, pp. 213-229.
![]() | V2I1131.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|