Results 31 to 40 of about 5,378 (199)

An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control

open access: yesApplied Sciences, 2018
In power cloud environment, the existing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) access control schemes, do not consider the generation of access structure and the existence of malicious users. To tackle these problems, a power cloud access
Yuancheng Li, Pan Zhang, Boyan Wang
doaj   +1 more source

An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption

open access: yesSensors, 2023
Ciphertext policy–attribute-based encryption (CP-ABE), which provides fine-grained access control and ensures data confidentiality, is widely used in data sharing.
Ronglei Hu   +6 more
doaj   +1 more source

PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT [PDF]

open access: yes, 2018
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly ...
Attia, R   +4 more
core   +5 more sources

Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
Countless data generated in Smart city may contain private and sensitive information and should be protected from unauthorized users. The data can be encrypted by Attribute-based encryption (CP-ABE), which allows encrypter to specify access policies in ...
Fei Meng, Leixiao Cheng, Mingqiang Wang
doaj   +1 more source

Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption

open access: yes, 2014
Traditional user authentication involves entering a username and password into a system. Strong authentication security demands, among other requirements, long, frequently hard-to-remember passwords.
Portnoi, Marcos, Shen, Chien-Chung
core   +1 more source

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control [PDF]

open access: yes, 2013
Outsourcing of personal health record (PHR) has attracted considerable interest recently. It can not only bring much convenience to patients, it also allows efficient sharing of medical information among researchers.
Chen, Xiaofeng   +5 more
core   +2 more sources

Forward-secure ciphertext-policy attribute-based encryption scheme

open access: yesTongxin xuebao, 2014
To mitigate the damage of key exposure in the context of ciphertext-policy attribute-based encryption (CP-ABE). The syntax and security model of forward-secure CP-ABE was presented. Then, a concreted forward-secure CP-ABE scheme was constructed.
EIJiang-hong W, IUWen-fen L, UXue-xian H
doaj   +2 more sources

A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram

open access: yesIEEE Access, 2017
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in many cyber physical systems and the Internet of Things for guaranteeing information security.
Long Li   +5 more
doaj   +1 more source

Debunking Common Myths & Misconceptions About NMC Positive Electrode Materials for Li‐ion Batteries

open access: yesAdvanced Energy Materials, EarlyView.
LiNixMnyCozO2 (NMC) and LiNixCoyAlzO2 (NCA) remain the choice for high‐energy‐density lithium‐ion battery positive electrode materials, yet many myths persist surrounding them. Herein, four common misconceptions are tackled to better inform the lithium‐ion battery field.
Matthew D. L. Garayt   +10 more
wiley   +1 more source

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search [PDF]

open access: yes, 2014
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.
NISHIDE Takashi   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy