Sun, Tongfeng; Ding, Shifei; Xu, Xinzheng An iterative stacked weighted auto-encoder. (English) Zbl 1498.68098 Soft Comput. 25, No. 6, 4833-4843 (2021). MSC: 68P25 68T05 PDFBibTeX XMLCite \textit{T. Sun} et al., Soft Comput. 25, No. 6, 4833--4843 (2021; Zbl 1498.68098) Full Text: DOI
Bai, Jianli; Yu, Jia; Gao, Xiang Secure auditing and deduplication for encrypted cloud data supporting ownership modification. (English) Zbl 1491.68066 Soft Comput. 24, No. 16, 12197-12214 (2020). MSC: 68P25 68M11 68P20 PDFBibTeX XMLCite \textit{J. Bai} et al., Soft Comput. 24, No. 16, 12197--12214 (2020; Zbl 1491.68066) Full Text: DOI
Manasrah, Ahmed M.; Abu Nasir, Mahmoud; Salem, Maher A privacy-preserving multi-keyword search approach in cloud computing. (English) Zbl 1490.68090 Soft Comput. 24, No. 8, 5609-5631 (2020). MSC: 68P27 68M11 68P25 PDFBibTeX XMLCite \textit{A. M. Manasrah} et al., Soft Comput. 24, No. 8, 5609--5631 (2020; Zbl 1490.68090) Full Text: DOI
Zhang, Jianhong; Bai, Wenle; Wang, Xianmin Identity-based data storage scheme with anonymous key generation in fog computing. (English) Zbl 1490.68089 Soft Comput. 24, No. 8, 5561-5571 (2020). MSC: 68P20 68P25 PDFBibTeX XMLCite \textit{J. Zhang} et al., Soft Comput. 24, No. 8, 5561--5571 (2020; Zbl 1490.68089) Full Text: DOI
Li, Jiguo; Hu, Shengzhou; Zhang, Yichen; Han, Jinguang A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation. (English) Zbl 1436.94079 Soft Comput. 24, No. 3, 1869-1882 (2020). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Li} et al., Soft Comput. 24, No. 3, 1869--1882 (2020; Zbl 1436.94079) Full Text: DOI
Deng, Lunzhi Anonymous certificateless multi-receiver encryption scheme for smart community management systems. (English) Zbl 1436.94051 Soft Comput. 24, No. 1, 281-292 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Deng}, Soft Comput. 24, No. 1, 281--292 (2020; Zbl 1436.94051) Full Text: DOI
Meshram, Chandrashekhar; Lee, Cheng-Chi; Meshram, Sarita Gajbhiye; Khan, Muhammad Khurram An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. (English) Zbl 1436.94083 Soft Comput. 23, No. 24, 13127-13138 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Meshram} et al., Soft Comput. 23, No. 24, 13127--13138 (2019; Zbl 1436.94083) Full Text: DOI
Chen, Hongjie; Liao, Yongjian Improvement of an outsourced attribute-based encryption scheme. (English) Zbl 1437.94056 Soft Comput. 23, No. 22, 11409-11417 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Chen} and \textit{Y. Liao}, Soft Comput. 23, No. 22, 11409--11417 (2019; Zbl 1437.94056) Full Text: DOI
Han, Yiliang Attribute-based encryption with adaptive policy. (English) Zbl 1418.94049 Soft Comput. 23, No. 12, 4009-4017 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Han}, Soft Comput. 23, No. 12, 4009--4017 (2019; Zbl 1418.94049) Full Text: DOI
Tian, Hui; Chen, Zhaoyi; Chang, Chin-Chen; Huang, Yongfeng; Wang, Tian; Huang, Zheng-an; Cai, Yiqiao; Chen, Yonghong Public audit for operation behavior logs with error locating in cloud storage. (English) Zbl 1418.68083 Soft Comput. 23, No. 11, 3779-3792 (2019). MSC: 68P25 68M11 PDFBibTeX XMLCite \textit{H. Tian} et al., Soft Comput. 23, No. 11, 3779--3792 (2019; Zbl 1418.68083) Full Text: DOI
Zhang, Jindan; Wang, Baocang; He, Debiao; Wang, Xu An Improved secure fuzzy auditing protocol for cloud data storage. (English) Zbl 1418.68015 Soft Comput. 23, No. 10, 3411-3422 (2019). MSC: 68M12 68M11 68P20 68P25 PDFBibTeX XMLCite \textit{J. Zhang} et al., Soft Comput. 23, No. 10, 3411--3422 (2019; Zbl 1418.68015) Full Text: DOI
Zhang, Huang; Zhang, Fangguo; Cheng, Rong; Tian, Haibo Efficient obfuscation for CNF circuits and applications in cloud computing. (English) Zbl 1415.68067 Soft Comput. 23, No. 6, 2061-2072 (2019). MSC: 68P25 68M11 94A60 94C10 PDFBibTeX XMLCite \textit{H. Zhang} et al., Soft Comput. 23, No. 6, 2061--2072 (2019; Zbl 1415.68067) Full Text: DOI
Zhu, Binrui; Sun, Jiameng; Qin, Jing; Ma, Jixin Fuzzy matching: multi-authority attribute searchable encryption without central authority. (English) Zbl 1415.68068 Soft Comput. 23, No. 2, 527-536 (2019). MSC: 68P25 68M11 PDFBibTeX XMLCite \textit{B. Zhu} et al., Soft Comput. 23, No. 2, 527--536 (2019; Zbl 1415.68068) Full Text: DOI Link
Liu, Weiran; Liu, Jianwei; Wu, Qianhong; Qin, Bo; Naccache, David; Ferradi, Houda Efficient subtree-based encryption for fuzzy-entity data sharing. (English) Zbl 1402.68056 Soft Comput. 22, No. 23, 7961-7976 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{W. Liu} et al., Soft Comput. 22, No. 23, 7961--7976 (2018; Zbl 1402.68056) Full Text: DOI
Zhang, Yinghui; Yang, Menglei; Zheng, Dong; Lang, Pengzhen; Wu, Axin; Chen, Chen Efficient and secure big data storage system with leakage resilience in cloud computing. (English) Zbl 1402.68057 Soft Comput. 22, No. 23, 7763-7772 (2018). MSC: 68P25 68M11 68P20 PDFBibTeX XMLCite \textit{Y. Zhang} et al., Soft Comput. 22, No. 23, 7763--7772 (2018; Zbl 1402.68057) Full Text: DOI
Wu, Libing; Chen, Biwen; Zeadally, Sherali; He, Debiao An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. (English) Zbl 1402.94074 Soft Comput. 22, No. 23, 7685-7696 (2018). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{L. Wu} et al., Soft Comput. 22, No. 23, 7685--7696 (2018; Zbl 1402.94074) Full Text: DOI
Gupta, B. B. (ed.); Agrawal, Dharma P. (ed.); Yamaguchi, Shingo (ed.); Sheng, Michael (ed.) Editorial: Advances in applying soft computing techniques for big data and cloud computing. (English) Zbl 1402.00040 Soft Comput. 22, No. 23, 7679-7683 (2018). MSC: 00B15 68-06 94-06 68P25 94A60 PDFBibTeX XMLCite \textit{B. B. Gupta} (ed.) et al., Soft Comput. 22, No. 23, 7679--7683 (2018; Zbl 1402.00040) Full Text: DOI
Han, Jinguang; Yang, Ye; Liu, Joseph K.; Li, Jiguo; Liang, Kaitai; Shen, Jian Expressive attribute-based keyword search with constant-size ciphertext. (English) Zbl 1398.68115 Soft Comput. 22, No. 15, 5163-5177 (2018). MSC: 68P10 68P25 PDFBibTeX XMLCite \textit{J. Han} et al., Soft Comput. 22, No. 15, 5163--5177 (2018; Zbl 1398.68115) Full Text: DOI
Li, Wenmin; Wen, Qiaoyan; Li, Xuelei; He, Debiao Attribute-based fuzzy identity access control in multicloud computing environments. (English) Zbl 1398.94134 Soft Comput. 22, No. 12, 4071-4082 (2018). MSC: 94A60 94A62 68M11 94D05 PDFBibTeX XMLCite \textit{W. Li} et al., Soft Comput. 22, No. 12, 4071--4082 (2018; Zbl 1398.94134) Full Text: DOI
Wang, Hao; He, Debiao; Shen, Jian; Zheng, Zhihua; Yang, Xiaoyan; Au, Man Ho Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps. (English) Zbl 1398.94175 Soft Comput. 22, No. 7, 2267-2274 (2018). MSC: 94A60 68M11 68P25 PDFBibTeX XMLCite \textit{H. Wang} et al., Soft Comput. 22, No. 7, 2267--2274 (2018; Zbl 1398.94175) Full Text: DOI
Li, Dazhi; Li, Minglu; Liu, Jianhua Evolutionary trust scheme of certificate game in mobile cloud computing. (English) Zbl 1398.94200 Soft Comput. 22, No. 7, 2245-2255 (2018). MSC: 94A62 68M11 68P25 PDFBibTeX XMLCite \textit{D. Li} et al., Soft Comput. 22, No. 7, 2245--2255 (2018; Zbl 1398.94200) Full Text: DOI
Zhong, Hong; Zhu, Wenlong; Xu, Yan; Cui, Jie Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. (English) Zbl 1381.94112 Soft Comput. 22, No. 1, 243-251 (2018). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{H. Zhong} et al., Soft Comput. 22, No. 1, 243--251 (2018; Zbl 1381.94112) Full Text: DOI
Ye, Jun; Wang, Jianfeng; Zhao, Jiaolian; Shen, Jian; Li, Kuan-Ching Fine-grained searchable encryption in multi-user setting. (English) Zbl 1384.68018 Soft Comput. 21, No. 20, 6201-6212 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Ye} et al., Soft Comput. 21, No. 20, 6201--6212 (2017; Zbl 1384.68018) Full Text: DOI
Ma, Siqi; Lai, Junzuo; Deng, Robert H.; Ding, Xuhua Adaptable key-policy attribute-based encryption with time interval. (English) Zbl 1384.94083 Soft Comput. 21, No. 20, 6191-6200 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Ma} et al., Soft Comput. 21, No. 20, 6191--6200 (2017; Zbl 1384.94083) Full Text: DOI Link
Wang, Hao; He, Debiao; Shen, Jian; Zheng, Zhihua; Zhao, Chuan; Zhao, Minghao Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. (English) Zbl 1381.94089 Soft Comput. 21, No. 24, 7325-7335 (2017). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{H. Wang} et al., Soft Comput. 21, No. 24, 7325--7335 (2017; Zbl 1381.94089) Full Text: DOI
Xu, Jie; Wen, Qiaoyan; Li, Wenmin; Shen, Jian; He, Debiao Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. (English) Zbl 1381.94107 Soft Comput. 21, No. 18, 5265-5279 (2017). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Xu} et al., Soft Comput. 21, No. 18, 5265--5279 (2017; Zbl 1381.94107) Full Text: DOI
Li, Ping; Li, Tong; Yao, Zheng-An; Tang, Chun-Ming; Li, Jin Privacy-preserving outsourcing of image feature extraction in cloud computing. (English) Zbl 1381.94101 Soft Comput. 21, No. 15, 4349-4359 (2017). MSC: 94A62 94A08 PDFBibTeX XMLCite \textit{P. Li} et al., Soft Comput. 21, No. 15, 4349--4359 (2017; Zbl 1381.94101) Full Text: DOI
Liu, Jia’nan; Lai, Junzuo; Huang, Xinyi Dual trapdoor identity-based encryption with keyword search. (English) Zbl 1387.94090 Soft Comput. 21, No. 10, 2599-2607 (2017). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{J. Liu} et al., Soft Comput. 21, No. 10, 2599--2607 (2017; Zbl 1387.94090) Full Text: DOI
Hu, Chengyu; Liu, Pengtao; Zhou, Yongbin; Guo, Shanqing; Wang, Yilei; Xu, Qiuliang Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks. (English) Zbl 1370.68077 Soft Comput. 20, No. 12, 4919-4932 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{C. Hu} et al., Soft Comput. 20, No. 12, 4919--4932 (2016; Zbl 1370.68077) Full Text: DOI
Chen, Peng; Ye, Jun; Chen, Xiaofeng Efficient request-based comparable encryption scheme based on sliding window method. (English) Zbl 1370.68076 Soft Comput. 20, No. 11, 4589-4596 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{P. Chen} et al., Soft Comput. 20, No. 11, 4589--4596 (2016; Zbl 1370.68076) Full Text: DOI
Hien, Thai Duy; Nakao, Zensho; Chen, Yen-Wei Robust RDWT-ICA based information hiding. (English) Zbl 1141.68406 Soft Comput. 10, No. 12, 1135-1144 (2006). MSC: 68P25 94A62 65T60 PDFBibTeX XMLCite \textit{T. D. Hien} et al., Soft Comput. 10, No. 12, 1135--1144 (2006; Zbl 1141.68406) Full Text: DOI