Results 171 to 180 of about 467 (189)
Some of the next articles are maybe not open access.

Forward and backward secure fuzzy encryption for data sharing in cloud computing

Soft Computing, 2017
The great benefits introduced by big data analysis technology motivate both individuals and enterprises to collect and share the data over the internet. Although cloud storage provides a perfect platform for data sharing, the security issue becomes the principal obstacle to preventing users from outsourcing their data to cloud servers, especially when ...
Jianghong Wei   +3 more
openaire   +1 more source

‘The Backward Will Be Beaten’: Historical Lesson, Security, and Nationalism in China

Journal of Contemporary China, 2020
What has China learned from the ‘Century of Humiliation’? In China’s mnemonic practices, ‘the backward will be beaten,’ which attributes the nation’s humiliation experiences to economic, military, ...
openaire   +1 more source

Completeness of security markets and backward stochastic differential equations with unbounded coefficients

Nonlinear Analysis: Theory, Methods & Applications, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +3 more sources

Post-quantum secure group signature with verifier local revocation and backward unlinkability

Computer Standards & Interfaces
Group signature supports users to generate signatures on behalf of the group. Verifier local revocation (VLR) is an important method to revoke a misbehaving user in group signature, which has attracted many researchers’ attention. However, the existing lattice-based group signature schemes with VLR either achieve only selfless anonymity, have ...
Shuaining Gao   +4 more
openaire   +2 more sources

Secure Data Sharing in Multiple Cloud Servers Using Forward and Backward Secrecy

2018
In this era, where technologies are in its pace the amount of data generated is huge. These data’s are usually stockpiled into cloud with an instinct of cost reduction and easy access of data. Thus there arises a need of securing the shared data. In this paper this disadvantage is overcome using revocable repository identity base encryption.
L. Gopika   +3 more
openaire   +1 more source

Luby-Rackoff Backwards with More Users and More Security

2021
Srimanta Bhattacharya, Mridul Nandi
openaire   +1 more source

THE COMPUTERIZATION OF SOCIAL SECURITY: THE WAY FORWARD OR A STEP BACKWARDS?

Public Administration, 1991
The Department of Social Security is one of the largest government departments, consuming 30 percent of public spending and employing around 10 per cent of central government StJ. Before 1980 there were no computers in its local administrative centres. The Operational Strategy was a plan to change this, involving the construction of largescale computer
openaire   +1 more source

Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms

2006
Most RFID (Radio Fequency IDentification) Tag security schemes assumed that the backward channel from tags to a reader is safe from eavesdropping. However, eavesdroppers near a tag can overhear message from the tag illegally. This may cause some privacy issues because the backward channel eavesdropping means the expose of personal information related ...
Wonjoon Choi, Byeong-hee Roh
openaire   +1 more source

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security

2018
Dynamic searchable symmetric encryption (DSSE) is a useful cryptographic tool in encrypted cloud storage. However, it has been reported that DSSE usually suffers from file-injection attacks and content leak of deleted documents. To mitigate these attacks, forward security and backward security have been proposed.
Cong Zuo   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy