SECURE OF WEB-ACCOUNTS USING PERSONAL-PCFG
Abstract
Keywords
Full Text:
PDFReferences
J. H. Seo, K. Emura, “Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Cryptographers” Track at the RSA Conference. Springer Berlin Heidelberg. 2013; 343-358.
J. Shao, Z. Cao, “Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption”. Information Sciences, 2012; 206, 83-95.
J.K. Liu, K. Liang, W. Susilo, J. Liu, Y. Xiang, “Two-Factor Data Security Protection Mechanism for Cloud Storage System”. IEEE Transactions
K. Liang, Z. Liu, X. Tan, D. S. Wong, C. Tang, “A CCA-secure identity-based conditional proxy re-encryption without random oracles. In: International Conference on Information Security and Cryptology”. Springer Berlin Heidelberg. 2012; 231-246.
L. Ferretti, M. Colajanni, M. Marchetti,”Distributed, concurrent, and independent access to encrypted cloud databases”. IEEE transactions on parallel and distributed systems, 2014; 25(2), 437-446. on Computers, 2016; 65(6), 1992-2004.
J. H. Seo, K. Emura,“Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Cryptographers” Track at the RSA Conference. Springer Berlin Heidelberg. 2013; 343-358.
J. Shao, Z. Cao, “Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption”. Information Sciences, 2012; 206, 83-95.
J.K. Liu, K. Liang, W. Susilo, J. Liu, Y. Xiang, “Two-Factor Data Security Protection Mechanism for Cloud Storage System”. IEEE Transactions
K. Liang, Z. Liu, X. Tan, D. S. Wong, C. Tang, “A CCA-secure identity-based conditional proxy re-encryption without random oracles”. In: International Conference on Information Security and Cryptology. Springer Berlin Heidelberg. 2012; 231-246.
L. Ferretti, M. Colajanni, M. Marchetti, “Distributed, concurrent, and independent access to encrypted cloud databases”. IEEE transactions on parallel and distributed systems, 2014; 25(2), 437-446. on Computers, 2016; 65(6), 1992-2004.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright © 2018 INTERNATIONAL EDUCATION AND RESEARCH JOURNAL
Comments on this article
by kathy burgessr (2018-01-15)
by Carolina Lima (2018-04-24)