Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebasedencryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp.321–334..
    2. JunbeomHur and Dong Kun Noh, ―AttributeBased Access Control with Efficient Revocation in Data Outsourcing Systems‖, IEEE Transactions on Parallel and Distributed Systems, pp 1214-1221, 2011.
    3. Lewko, Allison; Sahai, Amit; Waters, Brent, ―Revocation Systems with Very Small Private Keys‖, Security and Privacy (SP), IEEE Symposium, May 2010, 978-1-4244-6895-9, pp 273 – 285, 2010.
    4. Alexandra Boldyreva, VipulGoyal, Virendra Kumar, ―Identity-based encryption with efficient revocation‖, Proceedings of the 15th ACM conference on Computer and communications security, ISBN: 978- 1-59593-810-7, pp 417-426, 2008
    5. Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, ―Attribute based data sharing with attribute revocation‖, Proceedings of the 5th ACM Symposium on Information, ISBN: 978-1-60558-936-7, pp 261-270, 2010. .
    6. N. Chen, M. Gerla, D. Huang, and X. Hong, “Secure, selective groupbroadcast in vehicular networks using dynamic attribute based encryption,” inProc. Ad Hoc Netw. Workshop, 2010, pp. 1–8.
    7. S. Roy andM. Chuah, “Secure data retrieval based on ciphertext policyattribute-based encryption (CPABE) system for the DTNs,” LehighCSE Tech. Rep., 2009
    8. S. S.M. Chow, “Removing escrow from identitybased encryption,” in Proc. PKC, 2009, LNCS 5443, pp. 256–276.
    9. M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya, “P-signatures andnoninteractive anonymous credentials,” in Proc. TCC, 2008, LNCS 4948, pp. 356–3747

Recent Article