Login / Signup
A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation.
Ruoqing Zhang
Lucas Chi Kwong Hui
Siu-Ming Yiu
Xiaoqi Yu
Zechao Liu
Zoe Lin Jiang
Published in:
TrustCom/BigDataSE/ICESS (2017)
Keyphrases
</>
constraint programming
security model
information systems
access control
information technology
neural network
detection scheme
public key cryptography
electronic cash
bit rate
business process
attribute values
constraint satisfaction
public key
elliptic curve