Results 21 to 30 of about 18,941 (248)

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

open access: yesIET Networks, EarlyView., 2023
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley   +1 more source

Revocable Attribute-Based Encryption Scheme Assisted by Edge and Cloud [PDF]

open access: yesJisuanji gongcheng
Uploading data from Internet of Things (IoT) devices to the cloud has become a mainstream data management solution. However, cloud-based data management is associated with security risks.
ZHANG Weihang, ZHONG Yongyan, XIANG Yuanzhu, DING Shichan
doaj   +1 more source

On the efficiency of revocation in RSA-based anonymous systems [PDF]

open access: yes, 2016
© 2016 IEEEThe problem of revocation in anonymous authentication systems is subtle and has motivated a lot of work. One of the preferable solutions consists in maintaining either a whitelist L-W of non-revoked users or a blacklist L-B of revoked users ...
Fueyo, María, Herranz Sotoca, Javier
core   +2 more sources

Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems

open access: yesIEEE Access, 2019
The deduplication based on attribute-based encryption can be well used in eHealth systems to save storage space and share medical records. However, the excessive computation costs of existing schemes lead to inefficient deduplication.
Hua Ma   +4 more
doaj   +1 more source

Revocable Attribute-Based Signature for Blockchain-Based Healthcare System

open access: yesIEEE Access, 2020
Blockchain-Based Healthcare System (HS-BC) is an electronic medical record (EMR) data-sharing system, which significantly facilitates the storage, access, and sharing of EMR data, and provides patients with timely and effective medical diagnosis and ...
Qianqian Su   +3 more
doaj   +1 more source

Trust model for certificate revocation in Ad hoc networks [PDF]

open access: yes, 2007
In this paper we propose a distributed trust model for certificate revocation in Adhoc networks. The proposed model allows trust to be built over time as the number of interactions between nodes increase.
Gheorghita Ghinea   +9 more
core   +1 more source

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +3 more sources

Tetraaza[7]–[15]helicenes Synthesized by Two‐Step Strategy: Length‐Controlled Chiral π‐Systems Exhibiting Amplified Circularly Polarized Luminescence

open access: yesAngewandte Chemie, EarlyView.
A modular two‐step strategy provides tetraaza[n]helicenes (n = 7–15) as a homologous series with tunable photophysical and chiroptical properties. Extension beyond n = 11 induces pronounced through‐space π–π interactions, narrowing the energy gap and amplifying circularly polarized luminescence.
Takashi Otani   +6 more
wiley   +2 more sources

Revocable and Decentralized Attribute-Based Encryption

open access: yesThe Computer Journal, 2016
In this paper, we propose a revocable and decentralized attribute-based encryption (ABE) system that splits the task of decryption key generation across multiple attribute authorities (AAs) without requiring any central party such that it achieves attribute revocation by simply stopping updating of the corresponding private key.
Cui, H., Deng, R.H.
openaire   +3 more sources

Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption [PDF]

open access: yesSensors, 2019
Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers. In particular, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising, advanced type of encryption technique that resolves an open challenge to regulate ...
Ruqayah R. Al-Dahhan   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy