Results 21 to 30 of about 122,790 (284)

AAC-IoT: Attribute Access Control Scheme for IoT Using Lightweight Cryptography and Hyperledger Fabric Blockchain

open access: yesApplied Sciences, 2022
The Internet of Things (IoT) is an integrated environment as it merges physical smart objects to the Internet via wireless technologies to share data. The global connectivity of IoT devices brings the needs to ensure security and privacy for data owners ...
Suhair Alshehri, Omaimah Bamasag
doaj   +1 more source

Decentralized Attribute-Based Encryption and Signatures

open access: yesIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020
Tatsuaki OKAMOTO, Katsuyuki TAKASHIMA
openaire   +4 more sources

Attribute-based encryption schema with group signatures

open access: yes网络与信息安全学报, 2019
Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is ...
Xinglan ZHANG, Yao CUI
doaj   +3 more sources

SPCABS: Signature-Policy Comparable Attribute-Based Signatures

open access: yesSecurity and Communication Networks, 2022
Attribute-based signature is an attractive cryptographic primitive and finds broad applications in many fields. Existing attribute-based signature schemes deal with attributes in the way of “with” or “without,” and there is no attribute-based signature scheme that supports comparing attributes.
Hongying Chen   +3 more
openaire   +1 more source

Anisotropic Rock Model-Guided Post-Stack Attribute Analysis With Pore Type and Production Data for a Carbonate Gas Reservoir

open access: yesFrontiers in Earth Science, 2021
The Moxi area in the Sichuan Basin is dominated by carbonate gas reservoirs, where gas productivity is most strongly influenced by their pore types. Fractured caves are the most favorable pore structure type for reservoir productivity, followed by cave ...
Xuri Huang   +5 more
doaj   +1 more source

Attribute Based Pseudonyms: Anonymous and Linkable Scoped Credentials

open access: yesMathematics, 2022
Attribute-based credentials (ABCs) provide an efficient way to transfer custody of personal and private data to the final user, while minimizing the risk of sensitive data revelation and thus granting anonymity.
Francesc Garcia-Grau   +2 more
doaj   +1 more source

Software-defined network packet forwarding verification scheme based on attribute-based signatures identification

open access: yesTongxin xuebao, 2021
Aiming at the lack of effective forwarding verification mechanism for packet in software defined network (SDN), a data packet forwarding verification scheme based on attributed-based signatures identification was proposed.First, the attribute signature ...
Chaowen CHANG   +3 more
doaj   +2 more sources

Attribute-Based Signatures [PDF]

open access: yes, 2011
We introduce Attribute-Based Signatures (ABS), a versatile primitive that allows a party to sign a message with fine-grained control over identifying information. In ABS, a signer, who possesses a set of attributes from the authority, can sign a message with a predicate that is satisfied by his attributes.
Hemanta K. Maji   +2 more
openaire   +1 more source

Noise-tolerant approximate blocking for dynamic real-time entity resolution [PDF]

open access: yes, 2014
Entity resolution is the process of identifying records in one or multiple data sources that represent the same real-world entity. This process needs to deal with noisy data that contain for example wrong pronunciation or spelling errors. Many real world
Christen, Peter   +3 more
core   +1 more source

Decentralized Attribute-Based Signatures [PDF]

open access: yes, 2013
We present the first decentralized multi-authority attribute-based signature (DMA-ABS) scheme, in which no central authority and no trusted setup are required. The proposed DMA-ABS scheme for a large class of (non-monotone) predicates is fully secure (adaptive-predicate unforgeable and perfectly private) under a standard assumption, the decisional ...
Tatsuaki Okamoto, Katsuyuki Takashima
openaire   +1 more source

Home - About - Disclaimer - Privacy