Results 51 to 60 of about 696,470 (284)

Trust model for certificate revocation in Ad hoc networks [PDF]

open access: yes, 2007
In this paper we propose a distributed trust model for certificate revocation in Adhoc networks. The proposed model allows trust to be built over time as the number of interactions between nodes increase.
Gheorghita Ghinea   +9 more
core   +1 more source

IBBE-SGX: Cryptographic Group Access Control using Trusted Execution Environments

open access: yes, 2018
While many cloud storage systems allow users to protect their data by making use of encryption, only few support collaborative editing on that data. A major challenge for enabling such collaboration is the need to enforce cryptographic access control ...
Contiu, Stefan   +5 more
core   +1 more source

Blind key-generation attribute-based encryption for general predicates

open access: yesDesigns, Codes and Cryptography, 2022
Attribute-based encryption (ABE) is a form of public-key encryption that allows fine-grained access control on encrypted data. Blind key-generation (BKG) attribute-based encryption (Rial, Designs, Codes and Cryptography 2016) is a variant in which the ...
Masayuki Abe, Miguel Ambrona
semanticscholar   +1 more source

Attribute-based alterable threshold ring signature scheme with conspiracy attack immunity

open access: yesTongxin xuebao, 2015
Attribute-based cryptography is a generalization and development of the identity-based cryptography,which extends the identity to a set of attributes.In the attribute-based cryptosystem,different members with the same attributes can form a signature ring
Zhen CHEN, Wen-fang ZHANG, Xiao-min WANG
doaj   +2 more sources

Revocable Attribute-Based Encryption Scheme Assisted by Edge and Cloud [PDF]

open access: yesJisuanji gongcheng
Uploading data from Internet of Things (IoT) devices to the cloud has become a mainstream data management solution. However, cloud-based data management is associated with security risks.
ZHANG Weihang, ZHONG Yongyan, XIANG Yuanzhu, DING Shichan
doaj   +1 more source

Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management [PDF]

open access: yes, 2014
With the growing amount of personal information exchanged over the Internet, privacy is becoming more and more a concern for users. One of the key principles in protecting privacy is data minimisation. This principle requires that only the minimum amount
de Weger, Benne   +2 more
core   +1 more source

An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud

open access: yesConnection science, 2021
Dispatching and Control Cloud (DCC) is a cloud platform constructed by State Grid Corporation with the technology of cloud computing. DCC has improved the overall operation and monitoring capabilities, the smart level and many other advantages of power ...
Honghan Ji   +4 more
semanticscholar   +1 more source

Two Faces of NOTCH1 in Childhood Lymphoblastic T‐Cell Neoplasia: Prognostic Divergence of Mutational and Structural Aberrations

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT In pediatric patients, T‐cell lymphoblastic lymphoma (T‐LBL) survival exceeds 80%. Relapse remains associated with limited curative options. Frontline treatment is largely extrapolated from T‐cell acute lymphoblastic leukemia (T‐ALL) treatment, reflecting the ongoing debate, whether both entities represent distinct diseases or variants within ...
Marie C. Heider   +4 more
wiley   +1 more source

A schema for cryptographic keys generation using hybrid biometrics [PDF]

open access: yes, 2006
Biometric identifiers refer to unique physical properties or behavioural attributes of individuals. Some of the well known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. In our daily interaction with others directly
Donelan, Helen   +2 more
core  

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy