Results 21 to 30 of about 467 (189)
Attribute-based revocable collaborative access control scheme
To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group ...
Changgen PENG +4 more
doaj +2 more sources
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations.
Hyundo Yoon +4 more
doaj +1 more source
Design of efficient anonymous identity authentication protocol for lightweight IoT devices
Aiming at the problem that complex security primitives in existing schemes were not suitable for resource-constrained IoT devices, a lightweight efficient anonymous identity authentication protocol for IoT devices was designed based on physical ...
Zhenyu WANG +4 more
doaj +2 more sources
Dynamic Searchable Encryption (DSE) is essential for enabling confidential search operations over encrypted data in cloud computing. However, all existing single-server DSE schemes are vulnerable to Keyword Pair Result Pattern (KPRP) leakage and fail to ...
Haiyan Sun +3 more
doaj +1 more source
Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng +7 more
doaj +1 more source
Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN
For the future of the Internet, because information-centric network (ICN) have natural advantages in terms of content distribution, mobility, and security, it is regarded as a potential solution, or even the key, to solve many current problems.
Zhijun Wu, Yun Zhang, Enzhong Xu
doaj +1 more source
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
A Complete Key Management Scheme for LoRaWAN v1.1
Security is one of the major concerns of the Internet of Things (IoT) wireless technologies. LoRaWAN is one of the emerging Low Power Wide Area Networks being developed for IoT applications.
Xingda Chen, Margaret Lech, Liuping Wang
doaj +1 more source
Sustainable bioplastics manufacturing from renewable sources
Bioplastics are manufactured by using polymers from different bio‐based sources. These novel materials not only offer biodegradability but also possess various functional properties that make them suitable for diverse applications. Recent developments in the preparation of bioplastics are reported, highlighting the distinct properties of each type of ...
C. Valeria L. Giosafatto +6 more
wiley +1 more source
JPEG Privacy and Security framework for social networking and GLAM services
Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8).
Frederik Temmermans +6 more
doaj +1 more source

