You are not logged in.

Further observation on proxy re-encryption with keyword search

Wang, Xu An, Huang, Xinyi, Yang, Xiaoyuan, Liu, Longfei and Wu, Xuguang 2012, Further observation on proxy re-encryption with keyword search, Journal of systems and software, vol. 85, no. 3, pp. 643-654, doi: 10.1016/j.jss.2011.09.035.

Attached Files
Name Description MIMEType Size Downloads

Title Further observation on proxy re-encryption with keyword search
Author(s) Wang, Xu An
Huang, Xinyi
Yang, Xiaoyuan
Liu, Longfei
Wu, Xuguang
Journal name Journal of systems and software
Volume number 85
Issue number 3
Start page 643
End page 654
Total pages 12
Publisher Elsevier
Place of publication Amsterdam, The Netherlands
Publication date 2012-03
ISSN 0164-1212
Keyword(s) Proxy re-encryption with keyword search
Constrained single-hopunidirectional proxy re-encryption supporting conjunctive keywords search
Public key encryption with conjunctive keyword search
Language eng
DOI 10.1016/j.jss.2011.09.035
Field of Research 109999 Technology not elsewhere classified
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category C1.1 Refereed article in a scholarly journal
Copyright notice ©2012, Elsevier
Persistent URL http://hdl.handle.net/10536/DRO/DU:30064325

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 11 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 55 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Fri, 13 Jun 2014, 12:01:18 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.