Results 231 to 240 of about 696,470 (284)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Towards a cryptography encyclopedia: a survey on attribute-based encryption
Journal of Surveillance, Security and Safety, 2023Access control, a key feature of digital business models, such as streaming, relies on the implementation of encryption schemes. The diverse use of encryption schemes has led to the development of schemes with a variety of properties. This variety and a lack of comprehensive overview make it difficult for developers to select an appropriate scheme.
Thomas Prantl +7 more
openaire +2 more sources
Secure Healthcare Monitoring Sensor Cloud With Attribute-Based Elliptical Curve Cryptography
International Journal of Cloud Applications and Computing, 2021Sensor networks are integrated with cloud in many internet of things (IoT) applications for various benefits. Healthcare monitoring sensor cloud is one of the application that allows storing the patients' health data generated by their wearable sensors at cloud and facilitates the authorized doctors to monitor and advise them remotely.
Rajendra Kumar Dwivedi +2 more
openaire +2 more sources
ZigBee security for Home automation using attribute-based cryptography
2011 IEEE International Conference on Consumer Electronics (ICCE), 2011ZigBee is enabling technology of Home automation which designates an emerging practice of increased automation of intelligent appliances and household applications. ZigBee has many advantages of high availability, low power consumption, low cost which ideal for residential setting.
Hwajeong Seo, CheolSoo Kim, Howon Kim
openaire +2 more sources
Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography
International Conference on Information, Communications and Signal Processing, 2012As an important property of anonymous credential, attribute proof allows user to prove the possession of attributes issued by the issuing authority anonymously. In this paper, we introduced the notation of Attribute-based signature into anonymous credential to propose an anonymous credential with constant complexity attribute proof. Compared with other
Yan Zhang, Dengguo Feng
openaire +2 more sources
Privacy-preserving patient monitoring in healthcare IoT using attribute-based cryptography
Journal of Discrete Mathematical Sciences and CryptographyInternet of Things (IoT) technology has revolutionized patient monitoring systems by providing real-time health data for better medical care. However, the rise of IoT devices raises privacy concerns about sensitive health data. This study uses Attribute-based Cryptography (ABC) in patient monitoring to address these concerns.
Dhiraj Kumar Mane +5 more
openaire +2 more sources
2020 International Conference on Intelligent Engineering and Management (ICIEM), 2020
Cipher Text Policy Attribute Based Encryption which is a form of Public Key Encryption has become a renowned approach as a Data access control scheme for data security and confidentiality. It not only provides the flexibility and scalability in the access control mechanisms but also enhances security by fuzzy fined-grained access control.
Gurpreet Singh, Sushil Garg
openaire +2 more sources
Cipher Text Policy Attribute Based Encryption which is a form of Public Key Encryption has become a renowned approach as a Data access control scheme for data security and confidentiality. It not only provides the flexibility and scalability in the access control mechanisms but also enhances security by fuzzy fined-grained access control.
Gurpreet Singh, Sushil Garg
openaire +2 more sources
Securing cloud access with enhanced attribute-based cryptography
Computing, 2023Ashutosh Kumar, Garima Verma
openaire +2 more sources

