Results 81 to 90 of about 18,941 (248)
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Attribute-based authenticated key agreement protocol supporting revocation
Revocation is a crucial issue for the practical use of attribute-based authenticated key agreement (ABAKA) protocols. A new ABAKA protocol supporting revocation was proposed.
Qiang LI, Deng-guo FENG, Li-wu ZHANG
doaj +2 more sources
This article analyses a new wealth tax (the IGF) in Bolivia against the backdrop of the 2019 ousting of former president Evo Morales. In doing so, it engages calls for ‘a return to politics’ in anthropology by proposing the notion of a ‘fiscal grievance politics’ as animating elite opposition to the tax in lowland Santa Cruz department. I show that the
Charles Dolph
wiley +1 more source
War and Peace: Ogawa Takemitsu's Theological Engagement with State and Religion
The Manchurian Incident of 1931 marked a pivotal moment in the rise of Japanese fascism. During the period from this incident until the Pacific War's defeat, dissent from the state's control was not tolerated, leading to coercive measures in religious communities. The Christian community, rather than devising theological reasoning to resist the state's
Eun‐Young Park, Do‐Hyung Kim
wiley +1 more source
Multi-authority attribute-based encryption with efficient revocation
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from ...
Kai ZHANG +4 more
doaj +2 more sources
Abstract In contrast to the wealth of literature on the gendered and sexual politics of Indian nationalism, studies on the internationalisation of Indian anti‐colonial nationalism are rarely informed by the twin themes of gender and sexuality. As Indian activists traversed international political spaces in the early twentieth century, they frequently ...
Joanna Simonow
wiley +1 more source
ABSTRACT The disinheritance of a firstborn son accustomed to the privileges of exclusion has for centuries been a dramatic event for families, especially if the decision was taken by a woman, the son's own mother. Very few dared to do so, because it symbolised a break with the notion of virtuous, compassionate motherhood; it represented a failure to be
Mariela Fargas Peñarrocha
wiley +1 more source
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy-preserving access control mechanisms. Ciphertext policy attribute-based encryption (CP-ABE) is a widely recognized solution
Khanadech Worapaluk, Somchart Fugkeaw
doaj +1 more source
ABSTRACT This article looks at two critical moments in British immigration – the case of the ‘stateless’ Ugandan Asian husbands, whose wives successfully argued for their entry in Britain in 1973 and the ‘virginity test’ performed on Mrs K at Heathrow Airport in 1979.
Antara Datta, Jinal Parekh
wiley +1 more source
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations
With the pervasiveness of mobile communications, MSNs have become a promising networking paradigm for users to share contents with others through mobile devices. This convenience comes at the cost of some serious security and privacy issues. In this work,
Shi-Feng Sun +4 more
doaj +1 more source

