Results 231 to 240 of about 696,470 (284)

Towards a cryptography encyclopedia: a survey on attribute-based encryption

Journal of Surveillance, Security and Safety, 2023
Access control, a key feature of digital business models, such as streaming, relies on the implementation of encryption schemes. The diverse use of encryption schemes has led to the development of schemes with a variety of properties. This variety and a lack of comprehensive overview make it difficult for developers to select an appropriate scheme.
Thomas Prantl   +7 more
openaire   +2 more sources

Secure Healthcare Monitoring Sensor Cloud With Attribute-Based Elliptical Curve Cryptography

International Journal of Cloud Applications and Computing, 2021
Sensor networks are integrated with cloud in many internet of things (IoT) applications for various benefits. Healthcare monitoring sensor cloud is one of the application that allows storing the patients' health data generated by their wearable sensors at cloud and facilitates the authorized doctors to monitor and advise them remotely.
Rajendra Kumar Dwivedi   +2 more
openaire   +2 more sources

ZigBee security for Home automation using attribute-based cryptography

2011 IEEE International Conference on Consumer Electronics (ICCE), 2011
ZigBee is enabling technology of Home automation which designates an emerging practice of increased automation of intelligent appliances and household applications. ZigBee has many advantages of high availability, low power consumption, low cost which ideal for residential setting.
Hwajeong Seo, CheolSoo Kim, Howon Kim
openaire   +2 more sources

Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography

International Conference on Information, Communications and Signal Processing, 2012
As an important property of anonymous credential, attribute proof allows user to prove the possession of attributes issued by the issuing authority anonymously. In this paper, we introduced the notation of Attribute-based signature into anonymous credential to propose an anonymous credential with constant complexity attribute proof. Compared with other
Yan Zhang, Dengguo Feng
openaire   +2 more sources

Privacy-preserving patient monitoring in healthcare IoT using attribute-based cryptography

Journal of Discrete Mathematical Sciences and Cryptography
Internet of Things (IoT) technology has revolutionized patient monitoring systems by providing real-time health data for better medical care. However, the rise of IoT devices raises privacy concerns about sensitive health data. This study uses Attribute-based Cryptography (ABC) in patient monitoring to address these concerns.
Dhiraj Kumar Mane   +5 more
openaire   +2 more sources

Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security

2020 International Conference on Intelligent Engineering and Management (ICIEM), 2020
Cipher Text Policy Attribute Based Encryption which is a form of Public Key Encryption has become a renowned approach as a Data access control scheme for data security and confidentiality. It not only provides the flexibility and scalability in the access control mechanisms but also enhances security by fuzzy fined-grained access control.
Gurpreet Singh, Sushil Garg
openaire   +2 more sources

Home - About - Disclaimer - Privacy