Results 61 to 70 of about 122,790 (284)

Signature‐policy attribute‐based key‐insulated signature

open access: yesIET Information Security, 2017
Attribute‐based signature (ABS) schemes play a vital role to accomplish authentication and signer privacy simultaneously. In recent years, cryptographic primitives are deployed on insecure devices such as mobile devices; thereby, secret key exposure seems inevitable.
openaire   +1 more source

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

A novel approach to privacy and traceability using attribute-based signature in decentralized identifier

open access: yesHigh-Confidence Computing
This paper proposes a novel scheme that enhances privacy and ensures accountability by mitigating signature-based correlation risks in decentralized identifiers (DIDs). Existing DIDs often rely on traditional digital signatures, making them vulnerable to
Taehoon Kim   +3 more
doaj   +1 more source

A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System

open access: yesInformation, 2021
The internet of things (IoT) devices are expected to collect vast amounts of data that support different kinds of applications such as health monitor, smart home, and traffic management.
Shuang Sun, Rong Du, Shudong Chen
doaj   +1 more source

Tau acetylation at K331 has limited impact on tau pathology in vivo

open access: yesFEBS Letters, EarlyView.
We mapped tau post‐translational modifications in humanized MAPT knock‐in mice and in amyloid‐bearing double knock‐in mice. Acetylation within the repeat domain, particularly around K331, showed modest increases under amyloid pathology. To test functional relevance, we generated MAPTK331Q knock‐in mice.
Shoko Hashimoto   +3 more
wiley   +1 more source

Predicate signatures from pair encodings via dual system proof technique

open access: yesJournal of Mathematical Cryptology, 2019
Recently, Attrapadung (Eurocrypt 2014) proposed a generic framework for fully (adaptively) secure predicate encryption (PE) based on a new primitive, called pair encodings.
Nandi Mridul, Pandit Tapas
doaj   +1 more source

Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System

open access: yesIEEE Access, 2018
Cloud-based electronic health record (EHR) systems enable medical documents to be exchanged between medical institutions; this is expected to contribute to improvements in various medical services in the future.
Kwangsoo Seol   +4 more
doaj   +1 more source

XML data integrity based on concatenated hash function [PDF]

open access: yes, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core  

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy