Results 31 to 40 of about 40,456 (274)

Fine-grained Home File Security Sharing Scheme Based on Attribute Encryption [PDF]

open access: yesJisuanji gongcheng, 2018
In the environment of home sharing,the user’s identity privacy may be leaked in the process of obtaining the file.To solve this problem,a fine-grained file sharing scheme based on attribute encryption is proposed.According to the needs of users,the ...
LIANG Cai,TU Guoqing,LIU Mengjun
doaj   +1 more source

Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage

open access: yesIEEE Access, 2021
As is known, attribute-based encryption (ABE) is usually adopted for cloud storage, both for its achievement of fine-grained access control over data, and for its guarantee of data confidentiality.
Yang Ming, Baokang He, Chenhao Wang
doaj   +1 more source

On the feasibility of attribute-based encryption on Internet of Things devices [PDF]

open access: yes, 2016
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M   +6 more
core   +3 more sources

Biometric based Multi-Authority Inner Product Encryption for Electronic Health Record [PDF]

open access: yesEAI Endorsed Transactions on Pervasive Health and Technology, 2020
INTRODUCTION: Attribute-based encryption enhances the security of electronic health records outsourced to the cloud. At thesame time, single authority attribute based encryption leads to user privacy breech and attribute management complexity.Multi ...
C. Exceline, Jasmine Norman
doaj   +1 more source

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]

open access: yes, 2019
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W.   +4 more
core   +3 more sources

Multi-functional Attribute Based Encryption from Lattices [PDF]

open access: yesJisuanji kexue
Attribute based encryption from lattices has the property of resisting quantum attacks,and achieves fine-grained access control of attributes by cleverly embedding access control policies into ciphertext or keys.However,due to the inherent weaknesses of ...
GUO Lifeng, YANG Jieying, MA Tianjun, ZHANG Xialei
doaj   +1 more source

Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks [PDF]

open access: yes, 2009
Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-tomany structures are evolved due to need for conveying collected event information to ...
Bahsi, Hayretdin   +2 more
core   +1 more source

Intelligent XML Tag Classification Techniques for XML Encryption Improvement [PDF]

open access: yes, 2011
Flexibility, friendliness, and adaptability have been key components to use XML to exchange information across different networks providing the needed common syntax for various messaging systems. However excess usage of XML as a communication medium shed
Ammari, Faisal   +2 more
core   +1 more source

An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks.
Huawei Wang   +3 more
doaj   +1 more source

Search Me If You Can: Privacy-preserving Location Query Service [PDF]

open access: yes, 2013
Location-Based Service (LBS) becomes increasingly popular with the dramatic growth of smartphones and social network services (SNS), and its context-rich functionalities attract considerable users.
Jung, Taeho, Li, Xiang-Yang
core   +2 more sources

Home - About - Disclaimer - Privacy