Results 51 to 60 of about 753 (173)
In this comment paper, we point out a security flaw in a data access control system which is built on ciphertext-policy attribute-based encryption (CP-ABE) and attribute-based signature schemes.
Syh-Yuan Tan
doaj +1 more source
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer +5 more
wiley +1 more source
A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment
Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure.
Lihua Liu +3 more
doaj +1 more source
Verifiable Outsourced Decryption OO-CP-ABE Access Control Scheme with Hidden Policy [PDF]
In Ciphertext-Policy Attribute-Based Encryption(CP-ABE),the time required for data encryption and decryption is related to the complexity of the access structure,so implementing CP-ABE in mobile devices makes the device under greater computational ...
DILXAT Ghopur, CHEN Cheng, NURMAMAT Helil
doaj +1 more source
This research introduces a blockchain‐based framework designed to securely share medical images, with a focus on maintaining data integrity and privacy. The system uses image compression and a deep neural network‐based subject sensitive hashing (SSH) to ensure the integrity of the feature maps, storing encrypted images on the InterPlanetary File System
Yeasir Arafat +7 more
wiley +1 more source
Generative adversarial networks (GANs), a subset of deep learning, have demonstrated breakthrough performance in domains such as computer vision (CV) and natural language processing (NLP), particularly in surveillance, autonomous driving, and automated programing assistance.
Sunawar khan +7 more
wiley +1 more source
HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth
As an emerging cryptographic primitive, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for the owner to share his personal health records (PHRs) in mobile healthcare systems (mHealth).
Qi Li +5 more
doaj +1 more source
Keywords Extraction Technology for Few‐Shot Learning in Customer Service
Our study presents a model named synonym and dialogue sequence (S&DS) that employs synonym replacement and text dimensionality reduction using a pre‐trained BERT model, followed by keyword extraction based on a BiLSTM‐CRF neural network. ABSTRACT Customer service primarily involves interaction with clients through phone calls.
Xiaol Ma +4 more
wiley +1 more source
This paper focuses on studying the conflict between privacy protection and collaborative sharing. By mapping blockchain nodes to corresponding controllers and deploying them independently, the trusted sharing of domain information is achieved. Leveraging 6G technologies, significant latency issues introduced by uplink and download transmissions are ...
Hao She +3 more
wiley +1 more source
Removing escrow from ciphertext policy attribute-based encryption
Abstract Attribute-based encryption (ABE) is a promising cryptographic primitive for fine-grained access control of distributed data. In ciphertext policy attribute-based encryption (CP-ABE), each user is associated with a set of attributes and data are encrypted with access policies on attributes.
Hur, J Hur, Junbeom +3 more
openaire +2 more sources

