Results 41 to 50 of about 40,263 (275)
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
Privacy and security are the most important issues to the popularity of cloud computing service. In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and ...
Pan Jun Sun
doaj +1 more source
An Attribute Multiple Encryption Scheme Based on Lattices [PDF]
In order to improve the operating efficiency and the security of encryption and decryption of attribute encryption system,the theory of lattice instead of bilinear pairings is used to reduce the computational complexity of encryption and decryption ...
TANG Haiting,WANG Xueming
doaj +1 more source
The convenience and efficient management of cloud servers have resulted in an increasing number of users opting to store their data in the cloud. Consequently, data-outsourcing services relying on cloud servers have been extensively deployed and utilized.
Hua Shen, Jian Zhou, Ge Wu, Mingwu Zhang
doaj +1 more source
Secure Communication using Identity Based Encryption [PDF]
Secured communication has been widely deployed to guarantee confidentiality and\ud integrity of connections over untrusted networks, e.g., the Internet.
Cheng, Feng +3 more
core +6 more sources
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation [PDF]
With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving.
Chen, Keke, Guo, Shumin, Xu, Huiqi
core +1 more source
Reciprocal control of viral infection and phosphoinositide dynamics
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley +1 more source
PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT [PDF]
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly ...
Attia, R +4 more
core +5 more sources
By dawn or dusk—how circadian timing rewrites bacterial infection outcomes
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo +2 more
wiley +1 more source
ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs [PDF]
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider ...
Ambrosin, M +3 more
core +2 more sources
Ciphertext-Policy Attribute-Based Encryption [PDF]
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate access control.
John Bethencourt +2 more
openaire +1 more source

