2022
DOI: 10.1109/tdsc.2021.3065999
|View full text |Cite
|
Sign up to set email alerts
|

Revocable Attribute-Based Encryption With Data Integrity in Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 95 publications
(38 citation statements)
references
References 31 publications
0
38
0
Order By: Relevance
“…Denial of service (DoS) attack is a method used to disrupt legitimate users' access to the target network or website resources [33][34][35]. Usually this is achieved by overloading a target with a large amount of traffic (usually a web server), or by sending malicious requests that cause the target resource to malfunction or completely collapse [36][37][38][39][40][41].…”
Section: Security Analysismentioning
confidence: 99%
“…Denial of service (DoS) attack is a method used to disrupt legitimate users' access to the target network or website resources [33][34][35]. Usually this is achieved by overloading a target with a large amount of traffic (usually a web server), or by sending malicious requests that cause the target resource to malfunction or completely collapse [36][37][38][39][40][41].…”
Section: Security Analysismentioning
confidence: 99%
“…Figure 8 shows the secure connectivity versus the key pool size P in the AP. ere are four solid curves in Figure 8, from bottom to top, corresponding parameters [l, M] of [5,125], [10,250], [15,375], and [20,500], respectively. It is observed that the probability of sharing key increases when the number of preloaded keys increases.…”
Section: Secure Connectivitymentioning
confidence: 99%
“…(27) [4,5,7], in this scheme, the sensor node does not prestore any keys or other key materials, which not only reduces the storage cost of the sensor but also improves the resilience against the sensor capture because the attacker cannot obtain any key that belong to a safe node despite capturing a sensor physically. erefore, our proposal has perfect resilience against the sensor capture; that is,…”
Section: 4mentioning
confidence: 99%
See 1 more Smart Citation
“…to the Internet. As a result, many applications based on IoT like smart home, smart city, body networks and so on become popular and available which prompt the progress of the human society [2][3][4]. With the fast development of IoT technique [5][6][7], the data generated by IoT systems increases significantly so that traditional methods of data storage cannot match the requirements of data management for IoT systems.…”
Section: Introductionmentioning
confidence: 99%