Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable secure file sharing on untrusted storage,” in Proc. Conf. File Storage Technol., 2003, pp. 29–42.
    2. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proc. Eurocrypt, 2005, pp. 457–473.
    3. J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: outing for vehicle-based disruption tolerant networks,” in Proc.IEEE INFOCOM, 2006, pp. 1–11.
    4. M. Chuah and P. Yang, “Node density-based adaptive routing scheme for disruption tolerant networks,” in Proc. IEEE MILCOM, 2006, pp.1, 6.
    5. M. M. B. Tariq, M. Ammar, and E. Zequra, “Mesage ferry route design for sparse ad hoc networks with mobile nodes,” in Proc. ACM MobiHoc, 2006, pp. 37– 48.
    6. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89–98.
    7. M. Chuah and P. Yang, “Performance evaluation of content-based information retrieval schemes for DTNs,” in Proc. IEEE MILCOM, 2007, pp. 1–7.
    8. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased Encryption,” in Proc. IEEE Symp. Security Privacy, 2007, pp.321–334.
    9. R. Ostrovsky, A. Sahai, and B. Waters, “Attributebased encryption with non-monotonic access structures,” in Proc. ACM Conf. Comput.Commun. Security, 2007, pp. 195–203.
    10. S. Roy and M. Chuah, “Secure data retrieval based on ciphertext policy attribute-based encryption () system for the DTNs,” Lehigh CSE Tech. Rep., 2009.
    11. A. Lewko and B. Waters, “Decentralizing attributebased encryption,” Cryptology ePrint Archive: Rep. 2010/351, 2010.
    12. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proc. ASIACCS, 2010, pp. 261–270.
    13. Junbeom Hur and Kyungtae Kang, “Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks” IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 22, NO. 1, FEBRUARY 2014.
    14. A. Boldyreva, V. Goyal, and V. Kumar, “Identitybased encryption with efficient revocation,” in Proc. ACM Conf. Comput. Commun. Security

Recent Article