Results 21 to 30 of about 5,378 (199)
The use of transition‐metal catalysts and design of chiral ligands have allowed chemists to access highly functionalized benzofused 5‐ and 6‐ membered rings in high yield and enantioselectivity. A common strategy used relies on an intermolecular carbometalation across alkynes and olefins, usually followed by a subsequent intramolecular carbometalation.
Clara Jans +3 more
wiley +2 more sources
AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption [PDF]
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned
Jung, Taeho +3 more
core +1 more source
Attribute-based encryption implies identity-based encryption [PDF]
In this study, the author formally proves that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes.
Herranz Sotoca, Javier
core +2 more sources
Achieving Flexible and Self-Contained Data Protection in Cloud Computing
For enterprise systems running on public clouds in which the servers are outside the control domain of the enterprise, access control that was traditionally executed by reference monitors deployed on the system servers can no longer be trusted.
Bo Lang, Jinmiao Wang, Yanxi Liu
doaj +1 more source
Large Universe CP-ABE With Whitebox Traceability
In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users. Traceability is the ability of ABE to trace the malicious users or traitors who intentionally leak the partial or modified decryption keys for profits.
Anusha Sivanandhan, Angel M Eldhose
openaire +1 more source
CP-ABE Scheme Using Selectively Hidden Tree Access Structure [PDF]
Hidden access structure is a secure operation of Ciphertext Policy Attribute Base Encryption(CP-ABE),which can effectively prevent the leakage of sensitive information.However,tree access structure used by existing CP-ABE schemes are either completely ...
HAN Shuyan, Nurmamat Helil
doaj +1 more source
Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT [PDF]
Cloud-assisted IoT applications are gaining an expanding interest, such that IoT devices are deployed in different distributed environments to collect and outsource sensed data to remote servers for further processing and sharing among users.
Belguith, S, Kaaniche, N, Russello, G
core +3 more sources
Trusted access control mechanism for data with blockchain-assisted attribute encryption
In the growing demand for data sharing, how to realize fine-grained trusted access control of shared data and protect data security has become a difficult problem.
Chang Liu +5 more
doaj +1 more source
Constant Ciphertext Length in CP-ABE
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the attributes in secret key. The existing methods that use reasonably computable decryption policies produce the ciphertext of size at least linearly ...
Doshi, Nishant, Jinwala, Devesh
openaire +2 more sources
Benefits of Location-Based Access Control:A Literature Study [PDF]
Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system.
Cleeff, André van +2 more
core +2 more sources

