Results 51 to 60 of about 15,311 (163)
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy
Shi-Feng Sun +7 more
openaire +1 more source
SEAC: dynamic searchable symmetric encryption with lightweight update-search permission control
Sharing electronic protected health information (ePHI) is highly beneficial in public affairs. Constructing a cloud-assisted ePHI retrieval service represents a modern strategy that enhances cost-effectiveness and efficiency, making it a promising ...
Zhuobin Hu +6 more
doaj +1 more source
RFID Tag Ownership Transfer Protocol with Retrospective Ability
Tag ownership transfer is an important process for RFID system. Besides the user needs to obtain the information concerning the quality of products in some scenarios, which are attached by tags.
Gan Yong, He Lei, Yin Yi-feng
doaj +1 more source
Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security
Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). Performing pattern matching on plaintext data is straightforward, but the need to protect the security of ...
Xiaolu Chu +3 more
doaj +1 more source
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling.
Wei Ren, Jun Song, Min Lei, Yi Ren
doaj +1 more source
The nascent digital footprints of adolescents make them particularly susceptible to being misrepresented by AI systems. We design, implement, and evaluate two educational modules on the causes and consequences of two particularly salient types of AI ...
Mehtab Iqbal +7 more
doaj +1 more source
Practical group signature scheme with verifier-local revocation
An efficient approach of member revocation in group signature is verifier-local revocation.In this approach,revocation messages are only sent to signature verifiers,while signers have no involvement.There are some problems in group signature with ...
LI Ji-guo, SUN Gang, ZHANG Yi-chen
doaj +2 more sources
Supervised Blockchain Anonymous Transaction Model Based on Certificateless Signcryption
In response to the issues of high transaction transparency and regulatory difficulties in blockchain account-model transactions, this paper presents a supervised blockchain anonymous transaction model based on certificateless signcryption aimed at ...
Wenbao Jiang, Jin Ding, Haibao Zhang
doaj +1 more source
With the rapid increase in smart grid users and the increasing cost of user data transmission, proposing an encryption method that does not increase the construction cost while increasing the user ceiling has become the focus of many scholars.
Hongna Song +5 more
doaj +1 more source
With the rapid evolution of smart grids, secure and efficient data communication among hierarchical sensor devices has become critical to ensure privacy and system integrity.
Yun Feng +4 more
doaj +1 more source

