Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for vehicle-based disruption tolerant networks,†in Proc.IEEE INFOCOM, 2006, pp. 1–11. [2] M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,†in Proc. IEEE MILCOM, 2006, pp.1–6. [3] S. Roy and. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption (CPABE) system for the DTNs,†Lehigh CSE Tech. [4] M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,†in Proc. IEEE MILCOM, 2007, pp. 1–7. [5] M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,†in Proc.Conf. File Storage Technol., 2003, pp. 29–42. [6] L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Mediated ciphertext-policy attributebased encryption and its application,†in Proc. WISA, 2009, LNCS 5932, pp. 309–323. [7] N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption,†In Proc. Ad Hoc Netw. Workshop, 2010, pp. 1–8. [8] D. Huang and M. Verma, “ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks,†Ad Hoc Netw., vol. 7, no. 8, pp. 1526–1535, 2009. [9] A. Lewko and B. Waters, “Decentralizing attribute-based encryption,†Cryptology e-Print Archive: Rep. 2010/351, 2010. [10] A. Sahai and B. Waters, “Fuzzy identity-based encryption,†in Proc. Eurocrypt, 2005, pp. 457–473. [11] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,†in Proc.ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
![]() | V2I1211.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|