Results 81 to 90 of about 5,325 (187)
Generative adversarial networks (GANs), a subset of deep learning, have demonstrated breakthrough performance in domains such as computer vision (CV) and natural language processing (NLP), particularly in surveillance, autonomous driving, and automated programing assistance.
Sunawar khan +7 more
wiley +1 more source
Removing escrow from ciphertext policy attribute-based encryption
Abstract Attribute-based encryption (ABE) is a promising cryptographic primitive for fine-grained access control of distributed data. In ciphertext policy attribute-based encryption (CP-ABE), each user is associated with a set of attributes and data are encrypted with access policies on attributes.
Hur, J Hur, Junbeom +3 more
openaire +2 more sources
Keywords Extraction Technology for Few‐Shot Learning in Customer Service
Our study presents a model named synonym and dialogue sequence (S&DS) that employs synonym replacement and text dimensionality reduction using a pre‐trained BERT model, followed by keyword extraction based on a BiLSTM‐CRF neural network. ABSTRACT Customer service primarily involves interaction with clients through phone calls.
Xiaol Ma +4 more
wiley +1 more source
Simplified Ciphertext Policy Attribute Based Encryption for Multimedia Applications
Abstract In this modern age we generate data from various sophisticated systems and technologies for our personal use, the security and privacy of the data becomes a major concern while sharing it over the cloud platform. The conventional CP-ABE scheme is used to secure different types of data.The CP-ABE uses the access policy in the form of access ...
J. Joshua Daniel Raj +2 more
openaire +1 more source
This paper focuses on studying the conflict between privacy protection and collaborative sharing. By mapping blockchain nodes to corresponding controllers and deploying them independently, the trusted sharing of domain information is achieved. Leveraging 6G technologies, significant latency issues introduced by uplink and download transmissions are ...
Hao She +3 more
wiley +1 more source
Design of Crowdsourcing Supply Chain Platform Based on Ontology and Blockchain
In this paper, a novel crowdsourcing supply chain platform is proposed based on ontology and blockchain. The matching of tasks and candidate workers has been automatically achieved by designing some ontologies and SWRL rules. The quality of the submitted solutions can be effectively evaluated by the proposed improved confidence‐weighted voting ...
Yaohui Wu +3 more
wiley +1 more source
Group-oriented ciphertext-policy attribute-based encryption with expressive access policy
Based on the study of the traditional attribute-based encryption,a scheme called group-oriented ciphertext-policy attribute-based encryption was proposed.In the scheme,the access policy consists of AND-gate and OR-gate.Users were split up into different ...
Yang LI,Jiang-hua LIU,Wei WU
doaj +3 more sources
Modelling a Reliable Multimedia Transmission Approach for Medical Wireless Sensor Networks
The process of secret key sharing utilises the sender's public secret key and the receiver's private secret key to generate a shared secret key between the two devices. This same secret key generation method applies to communication between a sensor and a base station, whether in single‐hop or multi‐hop scenarios. Once the secret key is generated, data
R. Nidhya +7 more
wiley +1 more source
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Objectives: Although the traditional attribute-based encryption scheme achieves one-to-many access control,there are still challenges such as single point of failure,low efficiency,no support for data sharing,and privacy leakage.To solve these problems,a
Ruizhong DU, Tianhe ZHANG, Pengliang SHI
doaj +2 more sources
An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption. [PDF]
Hu R +6 more
europepmc +1 more source

