Results 41 to 50 of about 18,941 (248)

On the feasibility of attribute-based encryption on Internet of Things devices [PDF]

open access: yes, 2016
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M   +6 more
core   +3 more sources

Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption

open access: yes2024 IEEE Symposium on Security and Privacy (SP)
As an advanced one-to-many public key encryption system, attribute-based encryption (ABE) is widely believed to be a promising technology for achieving flexible and fine-grained access control of encrypted data on untrusted storage servers (e.g., public cloud servers). However, user revocation in ABE is a critical but challenging problem, and designing
LI, Xiaoguo   +6 more
openaire   +2 more sources

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems

open access: yesIEEE Access, 2017
Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. Since users' attributes may be issued by multiple attribute authorities, multi-
Xiaoyu Li   +4 more
doaj   +1 more source

EMI REGISTRY MANUAL [PDF]

open access: yes, 2013
EMI REGISTRY ...
Aiftimiei, Cristina
core   +1 more source

Secure Personal Content Networking over Untrusted Devices

open access: yes, 2014
Securely sharing and managing personal content is a challenging task in multi-device environments. In this paper, we design and implement a new platform called Personal Content Networking (PCN).
Joy, Joshua, Lee, Uichin, Noh, Youngtae
core   +1 more source

Server-Aided Revocable Attribute-Based Encryption

open access: yes, 2016
As a one-to-many public key encryption system, attribute-based encryption (ABE) enables scalable access control over encrypted data in cloud storage services. However, efficient user revocation has been a very challenging problem in ABE. To address this issue, Boldyreva, Goyal and Kumar [5] introduced a revocation method by combining the binary tree ...
Cui, H., Deng, R.H., Li, Y., Qin, B.
openaire   +3 more sources

Spatial Control Over Tether‐Tunable Coordination on Palladium for Divergent Synthesis of Bicyclo[n.1.0]alkanes via Oxidative Cyclopropanation of Enynes

open access: yesAdvanced Science, EarlyView.
We have developed a Pd‐catalyzed oxidative cyclopropanation of 1,n‐enynes employing cyclic diacyl peroxides as bifunctional reagents that serve as both tether‐tunable oxidants and spatially controlled dicarboxylate anions. ABSTRACT Bicyclo[n.1.0]alkanes are highly valuable scaffolds in drug discovery and synthetic chemistry.
Ting Yuan, Lei Shi
wiley   +1 more source

Competition Policy and Agribusiness in the Biden Administration

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT The Biden Administration pursued a set of ambitious competition policy initiatives in agriculture and agribusiness, primarily aimed at livestock and poultry supply chains, farm inputs, and food retailing. The initiatives included expanded antitrust enforcement; new US Department of Agriculture (USDA) contract regulations requiring poultry ...
James M. MacDonald
wiley   +1 more source

Server-Aided Revocable Attribute-Based Encryption from Lattices [PDF]

open access: yesSecurity and Communication Networks, 2020
Attribute-based encryption (ABE) can support a fine-grained access control to encrypted data. When the user’s secret-key is compromised, the ABE system has to revoke its decryption privileges to prevent the leakage of encrypted data. Although there are many constructions about revocable ABE from bilinear maps, the situation with lattice-based ...
Xingting Dong   +3 more
openaire   +1 more source

Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing

open access: yesSensors, 2018
Attribute-based encryption can be used to realize fine-grained data sharing in open networks. However, in practical applications, we have to address further challenging issues, such as attribute revocation and data search.
Axin Wu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy