Results 21 to 30 of about 259,266 (214)

Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings

open access: yesIEEE Access, 2021
Based on Sun et al.'s multi-client symmetric searchable encryption (SSE) scheme (at ESORICS 2016), and combining Zhao's identity-concealed authenticated encryption (CCS 2016), a new SSE scheme with multi-data-owner functionalities is proposed. By setting
Huige Wang   +3 more
doaj   +1 more source

Removing the Trusted Third Party in a Confidential Multiparty Registered eDelivery Protocol Using Blockchain

open access: yesIEEE Access, 2020
Recently several proposals of blockchain-based solutions for traditional e-commerce applications have been presented, taking advantage of the fact that blockchain is a technology that offers an immutable registry of data.
Macia Mut-Puigserver   +2 more
doaj   +1 more source

Patterned Cipher Block for Low-Latency Secure Communication

open access: yesIEEE Access, 2020
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh   +2 more
doaj   +1 more source

TABE-DAC: Efficient Traceable Attribute-Based Encryption Scheme With Dynamic Access Control Based on Blockchain

open access: yesIEEE Access, 2021
The features of decentralization and tamper-proof enable blockchain to be an emerging technology for integrity protection of important data stored on it.
Lifeng Guo, Xiaoli Yang, Wei-Chuen Yau
doaj   +1 more source

THE POSSIBLE CONFIDENTIALITY: THE PUBLIC ADMINISTRATION AS PARTY IN THE ALTERNATIVE DISPUTE RESOLUTION MECHANISM

open access: yesRevista Eletrônica de Direito Processual, 2017
This article debates the tension that exists between confidentiality, usual in ADRs, and the publicity principle, that rules the Public Administration in Brazil.
Carlos Alberto de Salles
doaj   +1 more source

Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

open access: yesSensors, 2012
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring ...
Prasan Kumar Sahoo
doaj   +1 more source

Confidential Care for Adolescents in the U.S. Health Care System

open access: yesJournal of Patient-Centered Research and Reviews, 2019
In providing care for adolescents, maintaining confidentiality should be considered a human right and an evidence-based component of quality care. Unfortunately, complexities in the U.S.
Priya R. Pathak, Adriana Chou
doaj   +1 more source

Launching the Society for Privacy and Confidentiality Research to Own the Journal of Privacy and Confidentiality

open access: yesThe Journal of Privacy and Confidentiality
We describe the launching of the Society for Privacy and Confidentiality Research (SPCR). SPCR is the new owner of the Journal of Privacy and Confidentiality, with the goal of ensuring a sustainable future for the Journal, and continuing to publish the ...
John M. Abowd   +6 more
doaj   +1 more source

Privacy and Cryptocurrencies—A Systematic Literature Review

open access: yesIEEE Access, 2020
Our transaction history in the current centralized banking system has the ability to reveal a lot of private information for each spender, both to the banking system itself, but also to those entities that surround it (e.g., governments, industry etc ...
Lasse Herskind   +2 more
doaj   +1 more source

Tool-Supported Architecture-Based Data Flow Analysis for Confidentiality [PDF]

open access: yesarXiv, 2023
Through the increasing interconnection between various systems, the need for confidential systems is increasing. Confidential systems share data only with authorized entities. However, estimating the confidentiality of a system is complex, and adjusting an already deployed software is costly.
arxiv  

Home - About - Disclaimer - Privacy