Results 31 to 40 of about 753 (173)

Outsourced ciphertext-policy attribute-based encryption with partial policy hidden

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Attribute-based encryption is an efficient and flexible fine-grained access control scheme. However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed.
Jinxia Yu   +4 more
doaj   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things

open access: yesIEEE Access, 2017
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can provide computation and storage services to end devices in Internet of Things (IoT).
Qinlong Huang, Yixian Yang, Licheng Wang
doaj   +1 more source

Institutional innovation essence and knowledge innovation goal of intellectual property law in the big data era

open access: yesJournal of Innovation & Knowledge, 2023
This work aims to expand the understanding on the nature of institutional innovation and the goal of knowledge innovation of intellectual property (IP) law in the era of big data (BD) and to avoid the risks of information security in the IP service ...
Chunling Zhang, Yumei Xu
doaj   +1 more source

On efficient ciphertext-policy attribute based encryption and broadcast encryption [PDF]

open access: yesProceedings of the 17th ACM conference on Computer and communications security, 2010
Existing CP-ABE schemes incur very large ciphertext size, which increases linearly with respect to the number of attributes in the access policy. Large ciphertext prevents CP-ABE from being adopted in the communication constrained environments. In this paper, we proposed a new construction of CP-ABE, named Constant-size CP-ABE (denoted as CCP-ABE) that
Zhibin Zhou, Dijiang Huang
openaire   +1 more source

Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu   +3 more
wiley   +1 more source

Fine-grained attribute update and outsourcing computing access control scheme in fog computing

open access: yesTongxin xuebao, 2021
To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute ...
Ruizhong DU, Peiwen YAN, Yan LIU
doaj   +2 more sources

Revocable attribute-based proxy re-encryption

open access: yesJournal of Mathematical Cryptology, 2021
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into ...
Luo Fucai, Al-Kuwari Saif
doaj   +1 more source

A Cloud Access Control Scheme Supporting Fine-grained Attribute Change [PDF]

open access: yesJisuanji gongcheng, 2018
For cloud data access control research,there are many problems such as large cost of attribute change and inflexibility.On the basis of ciphertext policy Attribute-based Encryption(ABE),this paper proposes a scheme supporting fine-grained attribute ...
TAN Yuesheng,XING Chenshuo,WANG Jingyu
doaj   +1 more source

Home - About - Disclaimer - Privacy