Results 11 to 20 of about 5,378 (199)
A practical application of CP-ABE for mobile PHR system: a study on the user accountability. [PDF]
Hong H, Chen D, Sun Z.
europepmc +2 more sources
On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core +9 more sources
On the feasibility of attribute-based encryption on Internet of Things devices [PDF]
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M +6 more
core +3 more sources
Search Me If You Can: Privacy-preserving Location Query Service [PDF]
Location-Based Service (LBS) becomes increasingly popular with the dramatic growth of smartphones and social network services (SNS), and its context-rich functionalities attract considerable users.
Jung, Taeho, Li, Xiang-Yang
core +2 more sources
ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs [PDF]
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider ...
Ambrosin, M +3 more
core +2 more sources
Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data
The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs) to the cloud for storage and sharing.
SMITHAMOL, M. B., RAJESWARI, S.
doaj +1 more source
Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing
Public key encryption supporting equality test (referred to as PKE-ET) provides the capability of testing the equivalence between two messages encrypted under different public keys.
Qiang Wang +4 more
doaj +1 more source
A Survey of Access Control Models in Wireless Sensor Networks [PDF]
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B. +3 more
core +2 more sources
Sharing photos on an open social platform with one-to-many features increases the leakage risk of information of the shared photos. Ciphertext-policy attribute-based encryption (CP-ABE) is a one-to-many public key cryptosystem, and its access policy can ...
Huaibo Sun, Hong Luo, Yan Sun
doaj +1 more source
Verifying Outsourced Decryption of CP-ABE with Signature [PDF]
Attribute-based encryption enables users to encrypt and decrypt messages based on user attributes. The computational complexities of decryption are very high. By Outsourcing decryption to the third party, it can address the problem. But the verifiability of results returned from the third party has yet to be addressed. In this paper, we introduce short
Peng Zhang, Xueyuan Wang, Hongwei Liu
openaire +1 more source

