Results 41 to 50 of about 5,325 (187)
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits [PDF]
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret keys: the size of keys in our system depends only on the depth of the policy circuit, not its size.
A. Fiat +33 more
core +3 more sources
Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption
Traditional user authentication involves entering a username and password into a system. Strong authentication security demands, among other requirements, long, frequently hard-to-remember passwords.
Portnoi, Marcos, Shen, Chien-Chung
core +1 more source
Attribute-based encryption implies identity-based encryption [PDF]
In this study, the author formally proves that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes.
Herranz Sotoca, Javier
core +2 more sources
Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
Attribute-based encryption is an efficient and flexible fine-grained access control scheme. However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed.
Jinxia Yu +4 more
doaj +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core +3 more sources
Confidentiality-Preserving Publish/Subscribe: A Survey
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains.
Felber, Pascal +3 more
core +1 more source
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source
Fog computing is a paradigm that extends cloud computing to the edge of the network. It can provide computation and storage services to end devices in Internet of Things (IoT).
Qinlong Huang, Yixian Yang, Licheng Wang
doaj +1 more source
This work aims to expand the understanding on the nature of institutional innovation and the goal of knowledge innovation of intellectual property (IP) law in the era of big data (BD) and to avoid the risks of information security in the IP service ...
Chunling Zhang, Yumei Xu
doaj +1 more source

