2015 International Electronics Symposium (IES) 2015
DOI: 10.1109/elecsym.2015.7380829
|View full text |Cite
|
Sign up to set email alerts
|

Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…In this paper, we extend our previous work [4], by proposing a secure data exchange over wireless medium using CP-ABE in the military case study. In this work, we consider for constructing a security system in MANETs for military operation with enabling secure adhoc routing at network layer and information exchange at application layer.…”
Section: Transport Layermentioning
confidence: 82%
See 4 more Smart Citations
“…In this paper, we extend our previous work [4], by proposing a secure data exchange over wireless medium using CP-ABE in the military case study. In this work, we consider for constructing a security system in MANETs for military operation with enabling secure adhoc routing at network layer and information exchange at application layer.…”
Section: Transport Layermentioning
confidence: 82%
“…In CP-ABE, The recipient only can decrypt if and only if the attribute set of his private key matches with the specified policy in the ciphertext. CP-ABE is appropriate for most applications, like for data exchange over wireless medium [4], Secure content exchange in DTN (Delay Tolerant Network) [5] [7]. However, the CP-ABE algorihm is not supported data integrity service.…”
Section: Transport Layermentioning
confidence: 99%
See 3 more Smart Citations