Results 61 to 70 of about 753 (173)

Design of Crowdsourcing Supply Chain Platform Based on Ontology and Blockchain

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In this paper, a novel crowdsourcing supply chain platform is proposed based on ontology and blockchain. The matching of tasks and candidate workers has been automatically achieved by designing some ontologies and SWRL rules. The quality of the submitted solutions can be effectively evaluated by the proposed improved confidence‐weighted voting ...
Yaohui Wu   +3 more
wiley   +1 more source

Simplified Ciphertext Policy Attribute Based Encryption for Multimedia Applications

open access: yesProcedia Computer Science, 2020
Abstract In this modern age we generate data from various sophisticated systems and technologies for our personal use, the security and privacy of the data becomes a major concern while sharing it over the cloud platform. The conventional CP-ABE scheme is used to secure different types of data.The CP-ABE uses the access policy in the form of access ...
J. Joshua Daniel Raj   +2 more
openaire   +1 more source

Modelling a Reliable Multimedia Transmission Approach for Medical Wireless Sensor Networks

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The process of secret key sharing utilises the sender's public secret key and the receiver's private secret key to generate a shared secret key between the two devices. This same secret key generation method applies to communication between a sensor and a base station, whether in single‐hop or multi‐hop scenarios. Once the secret key is generated, data
R. Nidhya   +7 more
wiley   +1 more source

Secure and Editable: A Blockchain Voting System Based on Chameleon Hash With Ephemeral Trapdoors

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Blockchain technology has become a popular choice for electronic voting systems due to its transparency, security, and decentralization. However, it is not a perfect solution, as its inherent immutability poses challenges in blockchain‐based e‐voting systems.
Qiankun Zheng   +4 more
wiley   +1 more source

Group-oriented ciphertext-policy attribute-based encryption with expressive access policy

open access: yes网络与信息安全学报, 2017
Based on the study of the traditional attribute-based encryption,a scheme called group-oriented ciphertext-policy attribute-based encryption was proposed.In the scheme,the access policy consists of AND-gate and OR-gate.Users were split up into different ...
Yang LI,Jiang-hua LIU,Wei WU
doaj   +3 more sources

A Secure Access Framework for IoT–Cloud Integration With Blockchain and Bi‐GCN

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Digital advancements have made cloud computing and IoT essential for innovative environments such as healthcare and industry. Cloud platforms offer scalable compute and storage capabilities, whereas IoT devices generate real‐time data. However, there are significant challenges faced while integrating the IoT with cloud to achieve robust, scalable, and ...
Kavitha M. S.   +2 more
wiley   +1 more source

Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing

open access: yesTongxin xuebao, 2022
Objectives: Although the traditional attribute-based encryption scheme achieves one-to-many access control,there are still challenges such as single point of failure,low efficiency,no support for data sharing,and privacy leakage.To solve these problems,a
Ruizhong DU, Tianhe ZHANG, Pengliang SHI
doaj   +2 more sources

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts

open access: yesInformation Sciences, 2014
10.1016/j.ins.2014.01.035 Attribute-based encryption (ABE) systems allow encrypting to uncertain receivers by means of an access policy specifying the attributes that the intended receivers should possess. ABE promises to deliver fine-grained access control of encrypted data.
Deng, Hua   +6 more
openaire   +2 more sources

mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography

open access: yesJournal of Mathematical Cryptology
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z.
Cianfriglia Marco   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy