Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
9
views
27
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,580
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computational Science – ICCS 2005
An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing
other
Author(s):
Ningzhi Deng
,
Shaojiang Deng
,
Chunqiang Hu
,
Kaiwen Lei
Publication date
(Online):
June 21 2019
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
27
Record
: found
Abstract
: not found
Article
: not found
How to share a secret
Adi Shamir
(1979)
0
comments
Cited
329
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Fuzzy Identity-Based Encryption
Amit Sahai
,
Brent Waters
(2005)
0
comments
Cited
97
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Fog Computing for the Internet of Things: Security and Privacy Issues
Arwa Alrawais
,
Abdulrahman Alhothaily
,
Chunqiang Hu
…
(2017)
0
comments
Cited
94
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2019
Publication date (Online):
June 21 2019
Pages
: 84-97
DOI:
10.1007/978-3-030-23597-0_7
SO-VID:
62eb59ad-a51c-4cab-8331-fdf6b6609e0e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Semantic Interoperation Among Data Systems at a Communication Level
pp. 19
Augmenting LOD-Based Recommender Systems Using Graph Centrality Measures
pp. 2
How to Enhance a Superscalar Processor to Provide Hard Real-Time Capable In-Order SMT
pp. 3
Learning to Use the Openbox: A Framework for the Implementation of Heterogeneous Reasoning
pp. 44
Investigating the Role of Goal Orientation: Metacognitive and Cognitive Strategy Use and Learning with Intelligent Tutoring Systems
pp. 55
A Hidden Astroturfing Detection Approach Base on Emotion Analysis
pp. 73
Towards an Evolutionary Formal Software-Development Using CASL
pp. 109
The Petri Net Kernel
pp. 149
New Approaches to Traitor Tracing with Embedded Identities
pp. 78
A Metamodel for Agents, Roles, and Groups
pp. 90
A Review of the Gaps and Opportunities of Nudity and Skin Detection Algorithmic Research for the Purpose of Combating Adolescent Sexting Behaviors
pp. 138
Qualitative risk assessment fulfils a need
pp. 66
An Efficient Method of Vehicle License Plate Detection Based on HSI Color Model and Histogram
pp. 84
An Efficient Revocable Attribute-Based Signcryption Scheme with Outsourced Designcryption in Cloud Computing
pp. 99
A Tool-Assisted Framework for Certified Bytecode Verification
pp. 86
The B tool (Abstract)
pp. 129
Siloed Federated Learning for Multi-centric Histopathology Datasets
pp. 217
Large FHE Gates from Tensored Homomorphic Accumulator
pp. 181
Knuth-bendix completion of horn clause programs for restricted linear resolution and paramodulation
pp. 237
A formal description of object-oriented programming using VDM
pp. 260
VDM proof obligations and their justification
pp. 370
What Is in a Step: New Perspectives on a Classical Question
pp. 196
Towards Illumination Invariance in the Legged League
pp. 218
A Deontic Logic for Socially Optimal Norms
pp. 339
The Kiv-approach to software verification
pp. 180
EMD-TEO Based Speech Emotion Recognition
pp. 288
Malware Triage Based on Static Features and Public APT Reports
pp. 317
A Survey of Agent-Oriented Methodologies
pp. 335
Mobile Haskell: Compiling lazy functional programs for the Java Virtual Machine
pp. 404
Model Driven Provisioning: Bridging the Gap Between Declarative Object Models and Procedural Provisioning Tools
pp. 284
Reuse of proofs in software verification
pp. 476
P3S: A Privacy Preserving Publish-Subscribe Middleware
pp. 231
The Barwise-Seligman Model of Representation Systems: A Philosophical Explication
pp. 264
Vision Sensors on the Webots Simulator
pp. 319
Compiling concurrent rewriting onto the Rewrite Rule Machine
pp. 223
Implementing MPI with the Memory-Based Communication Facilities on the SSS-CORE operating system
pp. 363
Parallel Materialization of Datalog Programs with Spark for Scalable Reasoning
pp. 490
Detection and optimization of functional computations in Prolog
pp. 495
Semantic Segmentation for Prohibited Items in Baggage Inspection
pp. 357
A Classification Method of Darknet Traffic for Advanced Security Monitoring and Response
pp. 578
UNED at ImageCLEF 2005: Automatically Structured Queries with Named Entities over Metadata
pp. 624
Towards Dynamically Adaptive Weather Analysis and Forecasting in LEAD
Similar content
4,580
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain
Authors:
Xiaohui Yang
,
Wenjie Li
,
Kai Fan
Proactive outsourcing - a strategic partnership Rank Xerox Technical Centre
Authors:
Angie Houston
,
Gary Youngs
A Blockchain-Based Privacy-Awareness Authentication Scheme with Efficient Revocation for Multi-Server Architectures
Authors:
Ling Xiong
,
Fa-gen Li
,
Sheng-ke Zeng
…
See all similar
Cited by
1
Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT
Authors:
Suhui Liu
,
Jiguo Yu
,
Chunqiang Hu
…
See all cited by