Results 51 to 60 of about 696,470 (284)
Trust model for certificate revocation in Ad hoc networks [PDF]
In this paper we propose a distributed trust model for certificate revocation in Adhoc networks. The proposed model allows trust to be built over time as the number of interactions between nodes increase.
Gheorghita Ghinea +9 more
core +1 more source
IBBE-SGX: Cryptographic Group Access Control using Trusted Execution Environments
While many cloud storage systems allow users to protect their data by making use of encryption, only few support collaborative editing on that data. A major challenge for enabling such collaboration is the need to enforce cryptographic access control ...
Contiu, Stefan +5 more
core +1 more source
Blind key-generation attribute-based encryption for general predicates
Attribute-based encryption (ABE) is a form of public-key encryption that allows fine-grained access control on encrypted data. Blind key-generation (BKG) attribute-based encryption (Rial, Designs, Codes and Cryptography 2016) is a variant in which the ...
Masayuki Abe, Miguel Ambrona
semanticscholar +1 more source
Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity
Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG
doaj +2 more sources
Revocable Attribute-Based Encryption Scheme Assisted by Edge and Cloud [PDF]
Uploading data from Internet of Things (IoT) devices to the cloud has become a mainstream data management solution. However, cloud-based data management is associated with security risks.
ZHANG Weihang, ZHONG Yongyan, XIANG Yuanzhu, DING Shichan
doaj +1 more source
Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management [PDF]
With the growing amount of personal information exchanged over the Internet, privacy is becoming more and more a concern for users. One of the key principles in protecting privacy is data minimisation. This principle requires that only the minimum amount
de Weger, Benne +2 more
core +1 more source
Dispatching and Control Cloud (DCC) is a cloud platform constructed by State Grid Corporation with the technology of cloud computing. DCC has improved the overall operation and monitoring capabilities, the smart level and many other advantages of power ...
Honghan Ji +4 more
semanticscholar +1 more source
ABSTRACT In pediatric patients, T‐cell lymphoblastic lymphoma (T‐LBL) survival exceeds 80%. Relapse remains associated with limited curative options. Frontline treatment is largely extrapolated from T‐cell acute lymphoblastic leukemia (T‐ALL) treatment, reflecting the ongoing debate, whether both entities represent distinct diseases or variants within ...
Marie C. Heider +4 more
wiley +1 more source
A schema for cryptographic keys generation using hybrid biometrics [PDF]
Biometric identifiers refer to unique physical properties or behavioural attributes of individuals. Some of the well known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. In our daily interaction with others directly
Donelan, Helen +2 more
core
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman +6 more
core +1 more source

