Results 51 to 60 of about 753 (173)

Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”

open access: yesIEEE Access, 2018
In this comment paper, we point out a security flaw in a data access control system which is built on ciphertext-policy attribute-based encryption (CP-ABE) and attribute-based signature schemes.
Syh-Yuan Tan
doaj   +1 more source

Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 1, January/February 2025.
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer   +5 more
wiley   +1 more source

A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment

open access: yesIEEE Access, 2019
Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure.
Lihua Liu   +3 more
doaj   +1 more source

Verifiable Outsourced Decryption OO-CP-ABE Access Control Scheme with Hidden Policy [PDF]

open access: yesJisuanji gongcheng, 2019
In Ciphertext-Policy Attribute-Based Encryption(CP-ABE),the time required for data encryption and decryption is related to the complexity of the access structure,so implementing CP-ABE in mobile devices makes the device under greater computational ...
DILXAT Ghopur, CHEN Cheng, NURMAMAT Helil
doaj   +1 more source

Decentralized Medical Image Sharing: A Blockchain Based Approach with Subject Sensitive Hashing for Enhanced Privacy and Integrity

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This research introduces a blockchain‐based framework designed to securely share medical images, with a focus on maintaining data integrity and privacy. The system uses image compression and a deep neural network‐based subject sensitive hashing (SSH) to ensure the integrity of the feature maps, storing encrypted images on the InterPlanetary File System
Yeasir Arafat   +7 more
wiley   +1 more source

A Systematic Literature Review on the Applications, Models, Limitations, and Future Directions of Generative Adversarial Networks

open access: yesIET Computers &Digital Techniques, Volume 2025, Issue 1, 2025.
Generative adversarial networks (GANs), a subset of deep learning, have demonstrated breakthrough performance in domains such as computer vision (CV) and natural language processing (NLP), particularly in surveillance, autonomous driving, and automated programing assistance.
Sunawar khan   +7 more
wiley   +1 more source

HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth

open access: yesIEEE Access, 2020
As an emerging cryptographic primitive, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for the owner to share his personal health records (PHRs) in mobile healthcare systems (mHealth).
Qi Li   +5 more
doaj   +1 more source

Keywords Extraction Technology for Few‐Shot Learning in Customer Service

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Our study presents a model named synonym and dialogue sequence (S&DS) that employs synonym replacement and text dimensionality reduction using a pre‐trained BERT model, followed by keyword extraction based on a BiLSTM‐CRF neural network. ABSTRACT Customer service primarily involves interaction with clients through phone calls.
Xiaol Ma   +4 more
wiley   +1 more source

Inter‐Domain Multi‐Controller Data Interaction Scheme Based on Blockchain in 6G Networks: A Novel Approach

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
This paper focuses on studying the conflict between privacy protection and collaborative sharing. By mapping blockchain nodes to corresponding controllers and deploying them independently, the trusted sharing of domain information is achieved. Leveraging 6G technologies, significant latency issues introduced by uplink and download transmissions are ...
Hao She   +3 more
wiley   +1 more source

Removing escrow from ciphertext policy attribute-based encryption

open access: yesComputers & Mathematics with Applications, 2013
Abstract Attribute-based encryption (ABE) is a promising cryptographic primitive for fine-grained access control of distributed data. In ciphertext policy attribute-based encryption (CP-ABE), each user is associated with a set of attributes and data are encrypted with access policies on attributes.
Hur, J Hur, Junbeom   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy