Results 81 to 90 of about 18,941 (248)

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Attribute-based authenticated key agreement protocol supporting revocation

open access: yesTongxin xuebao, 2014
Revocation is a crucial issue for the practical use of attribute-based authenticated key agreement (ABAKA) protocols. A new ABAKA protocol supporting revocation was proposed.
Qiang LI, Deng-guo FENG, Li-wu ZHANG
doaj   +2 more sources

Fiscal grievance politics: wealth taxation and master‐race democracy in post‐coup Bolivia Politique des griefs fiscaux : impôt sur la fortune et démocratie de la race maîtresse en Bolivie post‐coup d’État

open access: yesJournal of the Royal Anthropological Institute, EarlyView.
This article analyses a new wealth tax (the IGF) in Bolivia against the backdrop of the 2019 ousting of former president Evo Morales. In doing so, it engages calls for ‘a return to politics’ in anthropology by proposing the notion of a ‘fiscal grievance politics’ as animating elite opposition to the tax in lowland Santa Cruz department. I show that the
Charles Dolph
wiley   +1 more source

War and Peace: Ogawa Takemitsu's Theological Engagement with State and Religion

open access: yesJournal of Religious History, EarlyView.
The Manchurian Incident of 1931 marked a pivotal moment in the rise of Japanese fascism. During the period from this incident until the Pacific War's defeat, dissent from the state's control was not tolerated, leading to coercive measures in religious communities. The Christian community, rather than devising theological reasoning to resist the state's
Eun‐Young Park, Do‐Hyung Kim
wiley   +1 more source

Multi-authority attribute-based encryption with efficient revocation

open access: yesTongxin xuebao, 2017
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from ...
Kai ZHANG   +4 more
doaj   +2 more sources

Sexing the history of Indian anti‐colonial internationalism: White women, Indian men and the politics of the personal

open access: yesGender &History, EarlyView.
Abstract In contrast to the wealth of literature on the gendered and sexual politics of Indian nationalism, studies on the internationalisation of Indian anti‐colonial nationalism are rarely informed by the twin themes of gender and sexuality. As Indian activists traversed international political spaces in the early twentieth century, they frequently ...
Joanna Simonow
wiley   +1 more source

Mothers against the natural order: Gender representations and desertion of identities in the drama of disinheriting a son in eighteenth‐century Barcelona  

open access: yesGender &History, EarlyView.
ABSTRACT The disinheritance of a firstborn son accustomed to the privileges of exclusion has for centuries been a dramatic event for families, especially if the decision was taken by a woman, the son's own mother. Very few dared to do so, because it symbolised a break with the notion of virtuous, compassionate motherhood; it represented a failure to be
Mariela Fargas Peñarrocha
wiley   +1 more source

Blockchain-Enabled Privacy-Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy-preserving access control mechanisms. Ciphertext policy attribute-based encryption (CP-ABE) is a widely recognized solution
Khanadech Worapaluk, Somchart Fugkeaw
doaj   +1 more source

South Asian Bodies at British Borders in the 1970s: From the Ugandan Asian ‘Stateless Husbands’ to ‘Virginity Testing’

open access: yesGender &History, EarlyView.
ABSTRACT This article looks at two critical moments in British immigration – the case of the ‘stateless’ Ugandan Asian husbands, whose wives successfully argued for their entry in Britain in 1973 and the ‘virginity test’ performed on Mrs K at Heathrow Airport in 1979.
Antara Datta, Jinal Parekh
wiley   +1 more source

Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations

open access: yesInternational Journal of Distributed Sensor Networks, 2015
With the pervasiveness of mobile communications, MSNs have become a promising networking paradigm for users to share contents with others through mobile devices. This convenience comes at the cost of some serious security and privacy issues. In this work,
Shi-Feng Sun   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy