Inviting an author to review:
Find an author and click ‘Invite to review selected article’ near their name.
Search for authorsSearch for similar articles
0
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating

      , ,
      Human-centric Computing and Information Sciences
      Springer Nature

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references3

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Ciphertext-Policy Attribute-Based Encryption

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Attribute based data sharing with attribute revocation

                Bookmark

                Author and article information

                Journal
                Human-centric Computing and Information Sciences
                Hum. Cent. Comput. Inf. Sci.
                Springer Nature
                2192-1962
                December 2015
                March 22 2015
                December 2015
                : 5
                : 1
                Article
                10.1186/s13673-015-0027-0
                cf500d72-6fb4-48ff-8030-e2f3736d46b4
                © 2015

                http://creativecommons.org/licenses/by/2.0

                History

                Comments

                Comment on this article