DEPLOYING AN UNIQUE CONTROL SCHEME TO REDUCE THE IDENTITY LEAKAGE
Abstract
Keywords
References
H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,” Information Sciences, vol. 180, no. 13, pp. 2618–2632, 2010.
H. Ma, G. Zeng, Z. Wang, and J. Xu, “Fully secure multi-authority attribute-based traitor tracing,” JCIS, vol. 9, no. 7, pp. 2793–2800, 2013.
Y. Liu, J. Han, and J. Wang, “Rumor riding: anonymizing unstructured peer-to-peer systems,” TPDS, vol. 22, no. 3, pp. 464–475, 2011.
A. Kapadia, P. Tsang, and S. Smith, “Attribute-based publishing with hidden credentials and hidden policies,” NDSS, 2007.
L. Zhang, X.-Y. Li, and Y. Liu, “Message in a sealed bottle: Privacy preserving friending in social networks,” in ICDCS. IEEE, 2013, pp. 327–336.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.