DOI:10.20894/IJWT. Periodicity: Bi Annual. Impact Factor: SJIF:4.78 & GIF:0.428 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
F. Li, Y. Rahulamathavan, M. Rajarajan, "?Low Complexity multi-authority attribute based encryption scheme for mobile Cloud computing,", ?Low Complexity multi-authority attribute based en ,2013 View Artical
K. Yang, X. Jia, K. Ren, and B. Zhang, "?DAC-MACS: Effective data Access control for multi-authority cloud storage systems,", Springer, New York, ,2013 View Artical
H. Ma, G. Zeng, Z. Wang, "?Fully secure multi-authority Attribute-based traitor tracing,?", J. Comput. Inf. Syst. ,Vol.9 ,Issue 7 ,2013 View Artical
T. Jung, X. Mao, X.-Y. Li, S.-J. Tang,, "?Privacypreserving Data aggregation without secure channel: Multivariate polynomial Evaluation,", IEEE INFOCOM ,2013 View Artical
L. Zhang, X.-Y. Li, Y. Liu, and T. Jung, "?Verifiable private multiparty computation: Ranging and ranking,", IEEE INFOCOM ,2013 View Artical
John Bethencourt, "Ciphertext-Policy Attribute-Based Encryption", IEEE ,2007 View Artical
M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou,, "?Scalable and secure Sharing of personal health records in cloud computing using attribute based Enc ,Vol.24 ,Issue 1 ,2012 View Artical
S. Hohenberger and B. Waters, "?Attribute-based encryption with Fast decryption,?", Public-Key Cryptography.Springer-Verlag, ,2013 View Artical
J. Hur, "?Attribute-based secure data sharing with hidden policies in smart Grid,?", IEEE Trans. Parallel Distrib. Syst., ,Vol.24 ,Issue 11 ,2013 View Artical
Y. Zhang, X. Chen, J. Li, D. S. Wong, "?Anonymous attributebased Encryption supporting efficient decryption test,?", in Proc. 8th ASIACCS, ,2013 View Artical
X.-Y. Li and T. Jung,, "?Search me if you can: Privacy-preserving location Query service,", IEEE INFOCOM, ,2013 View Artical
W. Ren, K. Ren, W. Lou, and Y. Zhang, "?Efficient user revocation for Privacy-aware PKI,", in Proc. ICST, ,2008 View Artical
M. Chase and S. S. M. Chow, "?Improving privacy and security in multi-authority attribute-based encryption,", in Proc. 16th CCS, ,2009 View Artical
H. Lin, Z. Cao, X. Liang, and J. Shao, "?Secure threshold multi authority attribute based encryption without a central authority,?", Information Sciences ,Vol.180 ,Issue 13 ,2010 View Artical
V. Bo?ovi?c, D. Socek, R. Steinwandt, "?Multi-authority attribute-based encryption with honest-but-curious central authority,?", Int. J. Comput. Math ,Vol.89 ,Issue 3 ,2012 View Artical
A. Lewko and B. Waters, "?Decentralizing attribute-based encryption,?", in Advances in Cryptology. Berlin, Germany: Spring ,2011 View Artical
S. M?ller, S. Katzenbeisser, and C. Eckert, "?On multi-authority cipher text-policy attribute-based encryption,?", Bull. Korean Math. Soc., ,Vol.46 ,Issue 4 ,2009 View Artical
J. Li, Q. Huang, X. Chen, S. S. Chow, "?Multiauthority cipher text-policy attribute-based encryption with accountability,?", In Proc. 6th ASIACCS ,2011 View Artical
S. Yu, K. Ren, and W. Lou,, "?Attribute-based content distribution with hidden policy,", in Proc. 4th Workshop Secure Netw. Protocols, ,2008 View Artical