Spoofing Attacks on Speaker Verification Systems Based Generated Voice Using Genetic Algorithm | 0 | 0.34 | 2019 |
Robust and Scalable Data Access Control in D2D Communications. | 0 | 0.34 | 2018 |
Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud. | 0 | 0.34 | 2018 |
A Lightweight Policy Preserving EHR Sharing Scheme in the Cloud. | 2 | 0.38 | 2018 |
D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption. | 1 | 0.35 | 2018 |
Secure, efficient and revocable multi-authority access control system in cloud storage. | 17 | 0.56 | 2016 |
Large universe decentralized key-policy attribute-based encryption | 9 | 0.48 | 2015 |
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. | 9 | 0.47 | 2015 |
Attribute Based Multisignature Scheme for Wireless Communications. | 1 | 0.36 | 2015 |
Efficient attribute based sequential aggregate signature for wireless sensor networks | 4 | 0.40 | 2014 |
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model | 0 | 0.34 | 2014 |
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control | 3 | 0.42 | 2013 |
Improving security and efficiency for multi-authority access control system in cloud storage. | 0 | 0.34 | 2013 |
Fully Secure Decentralized Key-Policy Attribute-Based Encryption | 1 | 0.36 | 2013 |