Results 1 to 10 of about 696,470 (284)

A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT

open access: yesIEEE Access, 2018
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic technique that integrates data encryption with access control for ensuring data security in IoT systems.
Sheng Ding, Chen Li, Hui Li
doaj   +3 more sources

A distributed authentication and authorization scheme for in-network big data sharing

open access: yesDigital Communications and Networks, 2017
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in
Ruidong Li   +3 more
doaj   +1 more source

Enhanced cloud storage access control scheme based on attribute

open access: yesTongxin xuebao, 2013
In order to ensure the security of data and privacy in cloud storage, an enhanced cloud storage access control solution based on attribute was proposed.
De-hua NIU   +4 more
doaj   +2 more sources

ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

open access: yes, 2013
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan   +3 more
core  

SeCo2: Secure Cognitive Semantic Communication in 6G-IoT Networks Using Key-Policy Attribute-Based Encryption and Elliptic Curve Cryptography

open access: yesRadioengineering
Secure and efficient data transmission is crucial for maintaining seamless system operations and user trust in the rapidly evolving Internet of Things (IoT) environments. However, IoT networks consistently suffer from data integrity breaches, security vulnerabilities at various network layers, and a high computational cost. Bridging the gap between IoT
Sugitha, G.   +3 more
openaire   +3 more sources

On-demand key management based on social attribute for opportunistic networks

open access: yesTongxin xuebao, 2012
An on-demand key management scheme was proposed based on social attributes,which could conform to the characteristics of intermittent connectivity,high mobility and self-organized management in opportunistic networks.By utilizing the identity-based ...
Xi CHEN   +3 more
doaj   +2 more sources

A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

open access: yesThe Scientific World Journal, 2014
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates ...
Liaojun Pang, Jie Yang, Zhengtao Jiang
doaj   +1 more source

Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing

open access: yesJournal of King Saud University: Computer and Information Sciences
Compared with traditional wireless sensor networks, mobile crowdsensing networks have advantages of low cost, easy maintenance, and high scalability, which will play a role in city-level data sensing scenarios in the future.
Yuan Tian   +4 more
doaj   +1 more source

The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

open access: yesБезопасность информационных технологий, 2013
The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation
Sergey Vladimirovich Zapechnikov
doaj  

Lattice-based ABE with multi-ciphertext equality test in cloud computing

open access: yesJournal of King Saud University: Computer and Information Sciences
Data is typically encrypted before transmission to a cloud server to safeguard user privacy. However, such encryption prevents the server from performing searches on the data, necessitating the introduction of novel cryptographic primitives, such as ...
Mengdi Zhao   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy