File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Offline/online attribute-based encryption with verifiable outsourced decryption

TitleOffline/online attribute-based encryption with verifiable outsourced decryption
Authors
KeywordsCharm
offline/online ABE
outsourced decryption
verifiable computation
Issue Date2017
PublisherJohn Wiley & Sons Ltd. The Journal's web site is located at http://www.interscience.wiley.com/jpages/1532-0626/
Citation
9th International Conference Security and privacy in social networks (NSS2015), New York, NY, 3-5 November 2015. In Concurrency and Computation: Practice & Experience, 2016, v. 29 n. 7, p. e3915:1-17 How to Cite?
DescriptionCombined Special Issues on Security and privacy in social networks (NSS2015) and 18th IEEE International Conference on Computational Science and Engineering
Persistent Identifierhttp://hdl.handle.net/10722/246194
ISSN
2023 Impact Factor: 1.5
2023 SCImago Journal Rankings: 0.533
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorLiu, Z-
dc.contributor.authorJiang, Z-
dc.contributor.authorWang, X-
dc.contributor.authorHuang, X-
dc.contributor.authorYiu, SM-
dc.contributor.authorSadakane, K-
dc.date.accessioned2017-09-18T02:24:12Z-
dc.date.available2017-09-18T02:24:12Z-
dc.date.issued2017-
dc.identifier.citation9th International Conference Security and privacy in social networks (NSS2015), New York, NY, 3-5 November 2015. In Concurrency and Computation: Practice & Experience, 2016, v. 29 n. 7, p. e3915:1-17-
dc.identifier.issn1532-0626-
dc.identifier.urihttp://hdl.handle.net/10722/246194-
dc.descriptionCombined Special Issues on Security and privacy in social networks (NSS2015) and 18th IEEE International Conference on Computational Science and Engineering-
dc.languageeng-
dc.publisherJohn Wiley & Sons Ltd. The Journal's web site is located at http://www.interscience.wiley.com/jpages/1532-0626/-
dc.relation.ispartofConcurrency and Computation: Practice & Experience-
dc.rightsConcurrency and Computation: Practice & Experience. Copyright © John Wiley & Sons Ltd.-
dc.rightsPreprint: This is the pre-peer reviewed version of the following article: [FULL CITE], which has been published in final form at [Link to final article using the DOI]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving. Postprint: This is the peer reviewed version of the following article: [FULL CITE], which has been published in final form at [Link to final article using the DOI]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving. Special Statement for Preprint only Before publication: 'This is a preprint of an article accepted for publication in [The Journal of Pathology] Copyright © ([year]) ([Pathological Society of Great Britain and Ireland])'. After publication: the preprint notice should be amended to follows: 'This is a preprint of an article published in [include the complete citation information for the final version of the Contribution as published in the print edition of the Journal]' For Cochrane Library/ Cochrane Database of Systematic Reviews, add statement & acknowledgement : ‘This review is published as a Cochrane Review in the Cochrane Database of Systematic Reviews 20XX, Issue X. Cochrane Reviews are regularly updated as new evidence emerges and in response to comments and criticisms, and the Cochrane Database of Systematic Reviews should be consulted for the most recent version of the Review.’ Please include reference to the Review and hyperlink to the original version using the following format e.g. Authors. Title of Review. Cochrane Database of Systematic Reviews 20XX, Issue #. Art. No.: CD00XXXX. DOI: 10.1002/14651858.CD00XXXX (insert persistent link to the article by using the URL: http://dx.doi.org/10.1002/14651858.CD00XXXX) (This statement should refer to the most recent issue of the Cochrane Database of Systematic Reviews in which the Review published.)-
dc.subjectCharm-
dc.subjectoffline/online ABE-
dc.subjectoutsourced decryption-
dc.subjectverifiable computation-
dc.titleOffline/online attribute-based encryption with verifiable outsourced decryption-
dc.typeConference_Paper-
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.identifier.authorityYiu, SM=rp00207-
dc.identifier.doi10.1002/cpe.3915-
dc.identifier.scopuseid_2-s2.0-84994285952-
dc.identifier.hkuros276743-
dc.identifier.volume29-
dc.identifier.issue7-
dc.identifier.spagee3915:1-
dc.identifier.epage17-
dc.identifier.isiWOS:000398712500006-
dc.publisher.placeUnited Kingdom-
dc.description.other9th International Conference Security and privacy in social networks (NSS2015), New York, NY, 3-5 November 2015. In Concurrency and Computation: Practice & Experience, 2016, v. 29 n. 7, p. e3915:1-17-
dc.identifier.issnl1532-0626-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats