- Sahai and B. Waters. “Fuzzy Identity Based Encryption.”, In Advances in Cryptology – Eurocrypt, volume 3494 of LNCS, pages 457–473.Springer, 2005.
- Li, M., Lou,W., Ren, K., “ Data security and privacy in wireless body area networks”, IEEE Wireless Communications Magazine (February2010).
- M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data AccessControl in Multi-Owner Settings”, Proc. Sixth Int’l ICST Conf. Security and Privacy in Comm. Networks (SecureComm ’10),pp. 89-106, Sept. 2010.
- V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,”Proc. 13thACM Conf. Computer and Comm. Security (CCS ’06),pp. 89-98, 2006.
- Ming LiShucheng Yu, Yao Zheng,KuiRen, and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud ComputingUsing Attribute-Based Encryption”, IEEE transactions on parallel and distributed systems, vol. 24, no. 1, january 2013.
- Y. Zheng, “Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption”, master’s thesis, Worcester Polytechnic Inst.,2011.
- L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegationand Revocation of User Attributes”, 2009.
- S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,” Proc. Fifth ACM Symp. Information,Computer and Comm. Security (ASIACCS ’10), 2010.
- S. Narayan, M. Gagne´, and R. Safavi-Naini, “Privacy Preserving EHR System Using Attribute-Based Infrastructure”, Proc. ACM CloudComputing Security Workshop (CCSW ’10), pp. 47-52, 2010.
- J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption”, Proc. IEEE Symp. Security and Privacy (SP ’07), pp.321-334, 2007.
- J.A. Akinyele, C.U. Lehmann, M.D. Green, M.W. Pagano, Z.N.J. Peterson, and A.D. Rubin, “Self-Protecting Electronic Medical Records UsingAttribute-Based Encryption”, Cryptology ePrint Archive, Report 2010/565, http://eprint.iacr.org/, 2010.
- M. Chase and S.S. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption”, Proc. 16th ACM Conf. Computerand Comm. Security (CCS ’09), pp. 121-130, 2009.
- X. Liang, R. Lu, X. Lin, and X.S. Shen, “Ciphertext Policy Attribute Based Encryption with Efficient Revocation”, technical report, Univ. ofWaterloo, 2010.
- J. Hur and D.K. Noh, “Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems”, IEEE Trans. Parallel andDistributed Systems, vol. 22, no. 7, pp. 1214-1221, July2011.
- A. Boldyreva, V. Goyal, and V. Kumar, “Identity-Based Encryption with Efficient Revocation”, Proc. 15th ACM Conf. Computer and Comm.Security (CCS), pp. 417-426, 2008.
- D. Boneh and M. K. Franklin, “Identity-based encryption from the Weil pairing”, In CRYPTO, pages 213–229, 2001.
- R. Canetti, S. Halevi, and J. Katz., “Chosen-ciphertext security from identity-based encryption”, In EUROCRYPT, pages 207–222, 2004.
- N. Attrapadung and H. Imai, “Conjunctive Broadcast and Attribute-Based Encryption”, Proc. Third Int’l Conf. Palo Alto on Pairing-BasedCryptography-Pairing, pp. 248-265, 2009.
- Jin Sun, Yupu Hu, and Leyou Zhang., “A Key-Policy Attribute-Based Broadcast Encryption”, The International Arab Journal of nformationTechnology, Vol. 10, No. 5, September 2013
- Boneh D., Gentry C., and Waters B., “Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys”, in Proceedings ofthe 25th Annual International Cryptology Conference, USA, pp. 258-275, 2005.
- Zhang L., Hu Y., and Mu N., “Identity-Based Broadcast Encryption Protocol for Ad-hoc Networks”, in Proceedings of the 9th InternationalConference for Young Computer Scientists, Hunan, pp. 1619-1623, 2009.
- H. Lohr, A.-R. Sadeghi, and M. Winandy, “Securing the E-Health Cloud”, Proc. First ACM Int’l Health Informatics Symp. (IHI 10), pp. 220-229, 2010.
- M. Li, S. Yu, N. Cao, and W. Lou, “Authorized Private Keyword Search over Encrypted Personal Health Records in Cloud Computing”, Proc.31st Int’l Conf. Distributed Computing Systems (ICDCS ’11), June 2011.
|