Results 51 to 60 of about 15,311 (163)

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy

open access: yesProceedings 2021 Network and Distributed System Security Symposium, 2021
Shi-Feng Sun   +7 more
openaire   +1 more source

SEAC: dynamic searchable symmetric encryption with lightweight update-search permission control

open access: yesCybersecurity
Sharing electronic protected health information (ePHI) is highly beneficial in public affairs. Constructing a cloud-assisted ePHI retrieval service represents a modern strategy that enhances cost-effectiveness and efficiency, making it a promising ...
Zhuobin Hu   +6 more
doaj   +1 more source

RFID Tag Ownership Transfer Protocol with Retrospective Ability

open access: yesCybernetics and Information Technologies, 2015
Tag ownership transfer is an important process for RFID system. Besides the user needs to obtain the information concerning the quality of products in some scenarios, which are attached by tags.
Gan Yong, He Lei, Yin Yi-feng
doaj   +1 more source

Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security

open access: yesIET Information Security
Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). Performing pattern matching on plaintext data is straightforward, but the need to protect the security of ...
Xiaolu Chu   +3 more
doaj   +1 more source

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

open access: yesInternational Journal of Digital Multimedia Broadcasting, 2011
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling.
Wei Ren, Jun Song, Min Lei, Yi Ren
doaj   +1 more source

Teaching AI awareness in middle school classrooms: Design, implementation and evaluation of two education modules on algorithmic bias and filter bubbles

open access: yesComputers and Education: Artificial Intelligence
The nascent digital footprints of adolescents make them particularly susceptible to being misrepresented by AI systems. We design, implement, and evaluate two educational modules on the causes and consequences of two particularly salient types of AI ...
Mehtab Iqbal   +7 more
doaj   +1 more source

Practical group signature scheme with verifier-local revocation

open access: yesTongxin xuebao, 2011
An efficient approach of member revocation in group signature is verifier-local revocation.In this approach,revocation messages are only sent to signature verifiers,while signers have no involvement.There are some problems in group signature with ...
LI Ji-guo, SUN Gang, ZHANG Yi-chen
doaj   +2 more sources

Supervised Blockchain Anonymous Transaction Model Based on Certificateless Signcryption

open access: yesApplied Sciences
In response to the issues of high transaction transparency and regulatory difficulties in blockchain account-model transactions, this paper presents a supervised blockchain anonymous transaction model based on certificateless signcryption aimed at ...
Wenbao Jiang, Jin Ding, Haibao Zhang
doaj   +1 more source

A Privacy Protection Scheme of Certificateless Aggregate Ring Signcryption Based on SM2 Algorithm in Smart Grid

open access: yesMathematics
With the rapid increase in smart grid users and the increasing cost of user data transmission, proposing an encryption method that does not increase the construction cost while increasing the user ceiling has become the focus of many scholars.
Hongna Song   +5 more
doaj   +1 more source

Identity-Based Efficient Secure Data Communication Protocol for Hierarchical Sensor Groups in Smart Grid

open access: yesSensors
With the rapid evolution of smart grids, secure and efficient data communication among hierarchical sensor devices has become critical to ensure privacy and system integrity.
Yun Feng   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy