Cited By
View all- Tseng Y(2025)Blacklisting access control via negated subset predicate encryption: Constant-size ciphertexts/keys constructions with adaptive security or attribute hidingJournal of Information Security and Applications10.1016/j.jisa.2024.10395989(103959)Online publication date: Mar-2025
- Cai JZhang HDuo ZWang XZhao X(2024)A Multi-Group-Supporting Policy Hidden Fine-Grained Data Sharing Scheme in 5G-Enabled IoT With Edge ComputingIEEE Access10.1109/ACCESS.2024.338150912(46362-46378)Online publication date: 2024
- Walid RJoshi KChoi S(2024)Comparison of attribute-based encryption schemes in securing healthcare systemsScientific Reports10.1038/s41598-024-57692-w14:1Online publication date: 26-Mar-2024
- Show More Cited By