Results 241 to 250 of about 253,734 (274)
Some of the next articles are maybe not open access.
On backward-style verification for timed anonymity of security protocols
2016 IEEE 5th Global Conference on Consumer Electronics, 2016Trace anonymity is an extension of the formulation of anonymity by Schneider and Sidiropoulos. To prove the trace anonymity of infinite-state or unbounded systems, we have introduced proof techniques in which we find a binary relation called an anonymous simulation.
Yoshinobu Kawabe, Nobuhiro Ito
openaire +1 more source
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves
2021Dynamic searchable symmetric encryption (DSSE) can enable a cloud server to search and update over the encrypted data. Recently, forward and backward privacy in DSSE receive wide attention due to the rise in a number of emerging attacks exploiting the leakage in data update operations.
Viet Vo +4 more
openaire +1 more source
Economic Backwardness in Security Perspective [PDF]
Modern political economies are distinguished from each other by the institutions that mediate actors’ interactions, falling somewhere along a spectrum between pure market and non-market mechanisms. But how did these institutions originally emerge?
openaire
Food and Nutrition Security: Lessons From 'African Backwardness'
This research work explores food and nutrition security through the lens of Bemba indigenous knowledge and lived experiences in Northern Zambia. The research investigates how pre-colonial Bemba communities achieved nutrition security using local crops, traditional culinary practices, and food preservation methods.Hildah Mutale +2 more
openaire +1 more source
Symbolic backward reachability with effectively propositional logic
Formal Methods in System Design, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +4 more sources
Forward and backward secure fuzzy encryption for data sharing in cloud computing
Soft Computing, 2017The great benefits introduced by big data analysis technology motivate both individuals and enterprises to collect and share the data over the internet. Although cloud storage provides a perfect platform for data sharing, the security issue becomes the principal obstacle to preventing users from outsourcing their data to cloud servers, especially when ...
Jianghong Wei +3 more
openaire +1 more source
Nonlinear Analysis: Theory, Methods & Applications, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +3 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +3 more sources
Post-quantum secure group signature with verifier local revocation and backward unlinkability
Computer Standards & InterfacesGroup signature supports users to generate signatures on behalf of the group. Verifier local revocation (VLR) is an important method to revoke a misbehaving user in group signature, which has attracted many researchers’ attention. However, the existing lattice-based group signature schemes with VLR either achieve only selfless anonymity, have ...
Shuaining Gao +4 more
openaire +2 more sources
Secure Data Sharing in Multiple Cloud Servers Using Forward and Backward Secrecy
2018In this era, where technologies are in its pace the amount of data generated is huge. These data’s are usually stockpiled into cloud with an instinct of cost reduction and easy access of data. Thus there arises a need of securing the shared data. In this paper this disadvantage is overcome using revocable repository identity base encryption.
L. Gopika +3 more
openaire +1 more source
Luby-Rackoff Backwards with More Users and More Security
2021Srimanta Bhattacharya, Mridul Nandi
openaire +1 more source

