Results 41 to 50 of about 15,311 (163)
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations
With the pervasiveness of mobile communications, MSNs have become a promising networking paradigm for users to share contents with others through mobile devices. This convenience comes at the cost of some serious security and privacy issues. In this work,
Shi-Feng Sun +4 more
doaj +1 more source
Based on model randomization and adaptive defense for federated learning schemes
Federated Learning (FL) is a privacy-enhancing technique that enables multiple participants to collaboratively train machine learning models without sharing their local data.
Gaofeng Yue, Xiaowei Han
doaj +1 more source
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao +5 more
doaj +1 more source
Composed of multiple integrated energy systems (IESs) belonging to different stakeholders, multi‐agent IESs (MA‐IESs) are widely concerned because of data privacy protect.
Yu Kou +4 more
doaj +1 more source
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy
Recent developments in the field of Dynamic Searchable Symmetric Encryption (DSSE) with forward and backward privacy have attracted much attention from both research and industrial communities. However, most DSSE schemes with forward and backward privacy schemes only support single keyword queries, which impedes its prevalence in practice.
Cong Zuo +8 more
openaire +1 more source
ACE: A Consent-Embedded privacy-preserving search on genomic database
In this paper, we introduce ACE, a consent-embedded searchable encryption scheme. ACE enables dynamic consent management by supporting the physical deletion of associated data at the time of consent revocation. This ensures instant real deletion of data,
Sara Jafarbeiki +5 more
doaj +1 more source
An efficient conjunctive keyword searchable encryption for cloud-based IoT systems
Data privacy leakage has always been a critical concern in cloud-based Internet of Things (IoT) systems. Dynamic Symmetric Searchable Encryption (DSSE) with forward and backward privacy aims to address this issue by enabling updates and retrievals of ...
Tianqi Peng +6 more
doaj +1 more source
Group-Signature and Group Session Key Combined Safety Message Authentication Protocol for VANETs
Anonymous authentication has significant contribution to privacy protection in safety message dissemination for Vehicular Ad Hoc Networks (VANETs); however, it suffers from heavy workload of vehicle revocation check and message signature verification ...
Chunhua Zhang +4 more
doaj +1 more source
A novel framework for phishing detection based on backward recursive feature selection
Feature selection plays a crucial role in enhancing the accuracy and efficiency of phishing detection systems. Various innovative approaches have been proposed to optimize feature selection, which is essential for improving model performance and reducing
Esraa Abu Elsoud +7 more
doaj +1 more source

