Results 31 to 40 of about 696,470 (284)

A Survey of Access Control Models in Wireless Sensor Networks [PDF]

open access: yes, 2014
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B.   +3 more
core   +2 more sources

Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing

open access: yesJournal of Cloud Computing, 2023
Cloud file sharing (CFS) has become one of the important tools for enterprises to reduce technology operating costs and improve their competitiveness. Due to the untrustworthy cloud service provider, access control and security issues for sensitive data ...
BoXue Huang, Juntao Gao, Xuelian Li
semanticscholar   +1 more source

Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices

open access: yesApplied Sciences, 2023
Fog computing accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several security challenges. The security of end users and/or fog servers
Xiaodan Yan   +3 more
doaj   +1 more source

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

Short attribute-based signatures for arbitrary Turing machines from standard assumptions

open access: yesDesigns, Codes and Cryptography, 2023
This paper presents the first attribute-based signature ( ABS ) scheme supporting signing policies representable by Turing machines ( TM ), based on well-studied computational assumptions .
Pratish Datta   +2 more
semanticscholar   +1 more source

Efficient Pairing-Free Attribute-Based Blind Signature Scheme Based on Ordered Binary Decision Diagram

open access: yesIEEE Access, 2022
Attribute-based blind signature is used to realize the blind signature of messages by multiple people, and it is suitable for electronic payment services in the cloud.
Rui Ma, Linyue Du
doaj   +1 more source

Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography [PDF]

open access: yes, 2017
Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is ...
Emuoyibofarhe, Justice   +2 more
core   +2 more sources

Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice

open access: yesDesigns, Codes and Cryptography, 2022
Attribute-based encryption (ABE) cryptographically implements fine-grained access control on data. As such, data can be stored by an entity that is not necessarily trusted to enforce access control, or an entity that is not even trusted to have access to
M. Venema, Greg Alpár, J. Hoepman
semanticscholar   +1 more source

Multi-functional Attribute Based Encryption from Lattices [PDF]

open access: yesJisuanji kexue
Attribute based encryption from lattices has the property of resisting quantum attacks,and achieves fine-grained access control of attributes by cleverly embedding access control policies into ciphertext or keys.However,due to the inherent weaknesses of ...
GUO Lifeng, YANG Jieying, MA Tianjun, ZHANG Xialei
doaj   +1 more source

Attribute-based Single Sign-On: Secure, Private, and Efficient

open access: yesIACR Cryptology ePrint Archive, 2023
A Single Sign-On (SSO) system allows users to access different remote services while authenticating only once. SSO can greatly improve the usability and security of online activities by dispensing with the need to securely remember or store tens or ...
T. Frederiksen   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy