Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng, “Attribute-Based Encryption With Verifiable Outsourced Decryption”, IEEE Transactions On Information Forensics And Security, Vol. 8, No. 8, August 2013.
    2. J. Bethencourt, A. Sahai and B. Waters, “Ciphertext-Policy Attribute-Based Encryption”, Proceedings of IEEE Security and Privacy, (2007), Oakland
    3. G. Wang, Q. Liu and J. Wu, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services”, Proceedings of the 17th ACM conference on Computer and communicationssecurity, (2010), Chicago, USA.
    4. R. Bobba, H. Khurana and M. Prabhakaran, “Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption”, Proceedings of the 14th European conference on Research in computer security, (2009), Heidelberg.
    5. G. Wang, Q. Liu, J. Wu and M. Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers”, Computers & Security, Vol. 30, Issue 5, (2011) July, pp. 320–331.
    6. S. Muller, S. Katzenbeisser and C. Eckert, “Distributed Attribute-Based Encryption”, in International Conference on Information Security and Cryptology, (2008) December 3-5, Seoul, Korea.
    7. S. Yu, C. Wang, K. Ren and W. Lou, “Attribute Based Data Sharing with Attribute Revocation”, 5th ACM Symposium on Information, Computer and Communications Security, (2010) April 13 – 16, Beijing, China.
    8. G. Wang, Q. Liu and J. Wu, “Hierarchical attributebased encryption for fine-grained access control in cloud storage services”, Proceedings of the 17th ACM conference on Computer and communications security, (2010) October 4-8, New York, USA.
    9. P. Rohini, “Data Security Technique in cloud storage”, IJCST, Vol. 4, (2013), pp. 1

Recent Article