Results 241 to 250 of about 253,734 (274)
Some of the next articles are maybe not open access.

On backward-style verification for timed anonymity of security protocols

2016 IEEE 5th Global Conference on Consumer Electronics, 2016
Trace anonymity is an extension of the formulation of anonymity by Schneider and Sidiropoulos. To prove the trace anonymity of infinite-state or unbounded systems, we have introduced proof techniques in which we find a binary relation called an anonymous simulation.
Yoshinobu Kawabe, Nobuhiro Ito
openaire   +1 more source

Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves

2021
Dynamic searchable symmetric encryption (DSSE) can enable a cloud server to search and update over the encrypted data. Recently, forward and backward privacy in DSSE receive wide attention due to the rise in a number of emerging attacks exploiting the leakage in data update operations.
Viet Vo   +4 more
openaire   +1 more source

Economic Backwardness in Security Perspective [PDF]

open access: possible, 2004
Modern political economies are distinguished from each other by the institutions that mediate actors’ interactions, falling somewhere along a spectrum between pure market and non-market mechanisms. But how did these institutions originally emerge?
openaire  

Food and Nutrition Security: Lessons From 'African Backwardness'

This research work explores food and nutrition security through the lens of Bemba indigenous knowledge and lived experiences in Northern Zambia. The research investigates how pre-colonial Bemba communities achieved nutrition security using local crops, traditional culinary practices, and food preservation methods.
Hildah Mutale   +2 more
openaire   +1 more source

Symbolic backward reachability with effectively propositional logic

Formal Methods in System Design, 2012
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +4 more sources

Forward and backward secure fuzzy encryption for data sharing in cloud computing

Soft Computing, 2017
The great benefits introduced by big data analysis technology motivate both individuals and enterprises to collect and share the data over the internet. Although cloud storage provides a perfect platform for data sharing, the security issue becomes the principal obstacle to preventing users from outsourcing their data to cloud servers, especially when ...
Jianghong Wei   +3 more
openaire   +1 more source

Completeness of security markets and backward stochastic differential equations with unbounded coefficients

Nonlinear Analysis: Theory, Methods & Applications, 2005
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +3 more sources

Post-quantum secure group signature with verifier local revocation and backward unlinkability

Computer Standards & Interfaces
Group signature supports users to generate signatures on behalf of the group. Verifier local revocation (VLR) is an important method to revoke a misbehaving user in group signature, which has attracted many researchers’ attention. However, the existing lattice-based group signature schemes with VLR either achieve only selfless anonymity, have ...
Shuaining Gao   +4 more
openaire   +2 more sources

Secure Data Sharing in Multiple Cloud Servers Using Forward and Backward Secrecy

2018
In this era, where technologies are in its pace the amount of data generated is huge. These data’s are usually stockpiled into cloud with an instinct of cost reduction and easy access of data. Thus there arises a need of securing the shared data. In this paper this disadvantage is overcome using revocable repository identity base encryption.
L. Gopika   +3 more
openaire   +1 more source

Luby-Rackoff Backwards with More Users and More Security

2021
Srimanta Bhattacharya, Mridul Nandi
openaire   +1 more source

Home - About - Disclaimer - Privacy