Search Results

There are 7732 results for: content related to: Achieving dynamic privileges in secure data sharing on cloud storage

  1. Secure broadcast in distributed networks with strong adversaries

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3739–3750, Pawel Szalachowski and Tiffany Hyun-Jin Kim

    Version of Record online : 14 JUL 2015, DOI: 10.1002/sec.1296

  2. Collusion-resilient broadcast encryption based on dual-evolving one-way function trees

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3633–3645, Yao Zhang, Zhiming Zheng, Pawel Szalachowski and Qi Wang

    Version of Record online : 18 JUL 2016, DOI: 10.1002/sec.1570

  3. You have free access to this content
    Regulation of carotenoid biosynthesis in plants: evidence for a key role of hydroxymethylbutenyl diphosphate reductase in controlling the supply of plastidial isoprenoid precursors

    The Plant Journal

    Volume 40, Issue 2, October 2004, Pages: 188–199, Patricia Botella-Pavía, Óscar Besumbes, Michael A. Phillips, Lorenzo Carretero-Paulet, Albert Boronat and Manuel Rodríguez-Concepción

    Version of Record online : 16 AUG 2004, DOI: 10.1111/j.1365-313X.2004.02198.x

  4. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Version of Record online : 22 FEB 2012, DOI: 10.1002/sec.417

  5. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  6. You have free access to this content
    Methanogenesis by Methanosarcina acetivorans involves two structurally and functionally distinct classes of heterodisulfide reductase

    Molecular Microbiology

    Volume 75, Issue 4, February 2010, Pages: 843–853, Nicole R. Buan and William W. Metcalf

    Version of Record online : 4 DEC 2009, DOI: 10.1111/j.1365-2958.2009.06990.x

  7. Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4098–4109, Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong and Ximeng Liu

    Version of Record online : 25 AUG 2015, DOI: 10.1002/sec.1326

  8. Reconciling and improving of multi-receiver signcryption protocols with threshold decryption

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1430–1440, Mingwu Zhang, Bo Yang and Tsuyoshi Takagi

    Version of Record online : 24 FEB 2012, DOI: 10.1002/sec.509

  9. You have free access to this content
    Modelling the spatial configuration of refuges for a sustainable control of pests: a case study of Bt cotton

    Journal of Evolutionary Biology

    Volume 16, Issue 3, May 2003, Pages: 378–387, C. Vacher, D. Bourguet, F. Rousset, C. Chevillon and M. E. Hochberg

    Version of Record online : 17 APR 2003, DOI: 10.1046/j.1420-9101.2003.00553.x

  10. Universally composable issuer-free adaptive oblivious transfer with access policy

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3615–3633, Vandana Guleria and Ratna Dutta

    Version of Record online : 1 JUN 2015, DOI: 10.1002/sec.1285

  11. New packing method in somewhat homomorphic encryption and its applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2194–2213, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama and Takeshi Koshiba

    Version of Record online : 12 JAN 2015, DOI: 10.1002/sec.1164

  12. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  13. Efficient certificate-based encryption schemes without pairing

    Security and Communication Networks

    Minh-Ha Le, Intae Kim and Seong Oun Hwang

    Version of Record online : 8 DEC 2016, DOI: 10.1002/sec.1703

  14. Enabling efficient and secure data sharing in cloud computing

    Concurrency and Computation: Practice and Experience

    Volume 26, Issue 5, 10 April 2014, Pages: 1052–1066, Jingwei Li, Jin Li, Zheli Liu and Chunfu Jia

    Version of Record online : 21 JUN 2013, DOI: 10.1002/cpe.3067

  15. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  16. The genome of the Gram-positive metal- and sulfate-reducing bacterium Desulfotomaculum reducens strain MI-1

    Environmental Microbiology

    Volume 12, Issue 10, October 2010, Pages: 2738–2754, Pilar Junier, Thomas Junier, Sheila Podell, David R. Sims, John C. Detter, Athanasios Lykidis, Cliff S. Han, Nicholas S. Wigginton, Terry Gaasterland and Rizlan Bernier-Latmani

    Version of Record online : 17 MAY 2010, DOI: 10.1111/j.1462-2920.2010.02242.x

  17. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3688–3702, Yinghui Zhang, Dong Zheng, Qi Li, Jin Li and Hui Li

    Version of Record online : 24 AUG 2016, DOI: 10.1002/sec.1574

  18. Efficient oblivious transfer with adaptive queries in UC framework

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2592–2611, Vandana Guleria and Ratna Dutta

    Version of Record online : 21 JUL 2016, DOI: 10.1002/sec.1505

  19. Hierarchical attribute-based encryption with continuous auxiliary inputs leakage

    Security and Communication Networks

    Yuyan Guo, Jiguo Li, Yichen Zhang and Jian Shen

    Version of Record online : 15 DEC 2016, DOI: 10.1002/sec.1659

  20. Anonymous attribute-based proxy re-encryption for access control in cloud computing

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2397–2411, Yinghui Zhang, Jin Li, Xiaofeng Chen and Hui Li

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1509