Results 21 to 30 of about 467 (189)

Attribute-based revocable collaborative access control scheme

open access: yesTongxin xuebao, 2021
To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group ...
Changgen PENG   +4 more
doaj   +2 more sources

Exploiting Hidden Information Leakages in Backward Privacy for Dynamic Searchable Symmetric Encryption

open access: yesApplied Sciences
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations.
Hyundo Yoon   +4 more
doaj   +1 more source

Design of efficient anonymous identity authentication protocol for lightweight IoT devices

open access: yesTongxin xuebao, 2022
Aiming at the problem that complex security primitives in existing schemes were not suitable for resource-constrained IoT devices, a lightweight efficient anonymous identity authentication protocol for IoT devices was designed based on physical ...
Zhenyu WANG   +4 more
doaj   +2 more sources

DS-CKDSE: A Dual-Server Conjunctive Keyword Dynamic Searchable Encryption with Forward and Backward Security

open access: yesEntropy
Dynamic Searchable Encryption (DSE) is essential for enabling confidential search operations over encrypted data in cloud computing. However, all existing single-server DSE schemes are vulnerable to Keyword Pair Result Pattern (KPRP) leakage and fail to ...
Haiyan Sun   +3 more
doaj   +1 more source

Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT

open access: yesSensors
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng   +7 more
doaj   +1 more source

Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN

open access: yesFuture Internet, 2020
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems.
Zhijun Wu, Yun Zhang, Enzhong Xu
doaj   +1 more source

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

A Complete Key Management Scheme for LoRaWAN v1.1

open access: yesSensors, 2021
Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications.
Xingda Chen, Margaret Lech, Liuping Wang
doaj   +1 more source

Sustainable bioplastics manufacturing from renewable sources

open access: yesFEBS Open Bio, EarlyView.
Bioplastics are manufactured by using polymers from different bio‐based sources. These novel materials not only offer biodegradability but also possess various functional properties that make them suitable for diverse applications. Recent developments in the preparation of bioplastics are reported, highlighting the distinct properties of each type of ...
C. Valeria L. Giosafatto   +6 more
wiley   +1 more source

JPEG Privacy and Security framework for social networking and GLAM services

open access: yesEURASIP Journal on Image and Video Processing, 2017
Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8).
Frederik Temmermans   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy