Results 71 to 80 of about 5,378 (199)

Secure Data Communication using File Hierarchy Attribute Based Encryption in Wireless Body Area Networks

open access: yesJournal of Communications Software and Systems, 2018
Wireless Body Area Networks (WBANs) play an important role in healthcare system by enabling medical experts to guide patients without measuring face-to-face.
Balaji Chandrasekaran   +2 more
doaj  

A Lightweight Policy Preserving EHR Sharing Scheme in the Cloud

open access: yesIEEE Access, 2018
Electronic Health Record (EHR) is a digital health documentary. It contains not only the health-related records but also the personal sensitive information. Therefore, how to reliably share EHR through the cloud is a challenging issue.
Zuobin Ying   +4 more
doaj   +1 more source

Palmitoylation‐Mediated Ubiquitination of SRPK1 Regulates Ferroptosis in High‐Fat‐Induced Erectile Dysfunction

open access: yesAdvanced Science, Volume 13, Issue 19, 2 April 2026.
Elevated exogenous palmitic acid promotes the S‐palmitoylation of SRPK1 in endothelial cells, a dynamic process governed by ZDHHC24 and APT1. This post‐translational modification strengthens the interaction between SRPK1 and the E3 ubiquitin ligase MIB1, thereby facilitating the proteasomal degradation of SRPK1.
Xiao‐Hui Tan   +11 more
wiley   +1 more source

Encryption Based Access Control Model in Cloud: a Survey [PDF]

open access: yes, 2015
Cloud computing is known as “Utility”. Cloud Computing enabling users to remotely store their data in a server and provide services on-demand. Since this new computing technology requires user to entrust their valuable data to cloud providers, there have
Aluvalu, R. (Rajanikanth)   +1 more
core  

Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure

open access: yesIEEE Access, 2019
In ciphertext-policy attribute-based encryption (CP-ABE) schemes, the computational overhead and the length for the ciphertext are positively correlated with the complexity of the access structure. In addition, the access structure embedded in ciphertext
Yichen Zhang, Jiguo Li, Hao Yan
doaj   +1 more source

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

Spontaneous Fermentation‐Induced Changes in Selected Ghanaian Plant‐Based Flours: Physico‐Functional and Biochemical Insights for Complementary Food Use

open access: yesFood Science &Nutrition, Volume 14, Issue 4, April 2026.
Impact of spontaneous fermentation on functional, pasting, and biochemical properties of indigenous Ghanaian plant matrices. ABSTRACT This study investigated the effects of spontaneous fermentation (SF) on the physicochemical and biochemical properties of seven Ghanaian staples: maize, millet, sorghum, sweetpotato, cassava, plantain, and soybeans.
Richard Atinpoore Atuna   +6 more
wiley   +1 more source

Data Aggregation without Secure Channel: How to Evaluate a Multivariate Polynomial Securely

open access: yes, 2013
Much research has been conducted to securely outsource multiple parties' data aggregation to an untrusted aggregator without disclosing each individual's data, or to enable multiple parties to jointly aggregate their data while preserving privacy ...
Gong, Wei   +5 more
core   +1 more source

Comparing Lattices and Bilinear Parings in CP-ABE

open access: yesDe Cifris Koine
Ciphertext-Policy Attribute-Based Encryption enables fine-grained access control by binding ciphertext decryption to user attributes. While most practical schemes are pairing-based and rely on assumptions vulnera- ble to quantum attacks, lattice-based approaches offer post-quantum secu- rity at the cost of reduced expressiveness.
Gasparini, Lorenzo   +3 more
openaire   +2 more sources

CP‐ABE with outsourced decryption and directionally hidden policy

open access: yesSecurity and Communication Networks, 2016
AbstractCiphertext‐policy attribute‐based encryption (CP‐ABE) is a novel cryptographic primitive for access controlling. However, the existing CP‐ABE schemes are very inefficient as the decryptions involve many expensive pairing operations. Another drawback is that the access policy itself may disclose some privacies of the users.
Zhiwei Wang, Wenyang Liu
openaire   +1 more source

Home - About - Disclaimer - Privacy