Results 241 to 250 of about 39,375 (295)
Some of the next articles are maybe not open access.

Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage

IEEE transactions on computers, 2020
Attribute-based encryption (ABE) is a preferred technology used to access control the data stored in the cloud servers. However, in many cases, the authorized decryption user may be unable to decrypt the ciphertext in time for some reason.
Ningyu Chen   +3 more
semanticscholar   +1 more source

Decrypting C2 inhibitors

Blood, 2014
In this issue of Blood, Nguyen et al employ high-resolution mapping to precisely define epitopes on the C2 domain of blood coagulation factor VIII (FVIII).1 Their results nicely complement a recent report in Blood describing the structure of a ternary complex of 2 inhibitory antibodies with the C2 domain.2 Together, these studies reveal fascinating ...
Voorberg, Jan, Meems, Henriët
openaire   +3 more sources

Full Verifiability for Outsourced Decryption in Attribute Based Encryption

IEEE Transactions on Services Computing, 2020
Attribute based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data. However, the decryption cost and ciphertext size restrict the application of ABE in practice.
Jiguo Li   +3 more
semanticscholar   +1 more source

A More Accurate and Robust Binary Ring-LWE Decryption Scheme and Its Hardware Implementation for IoT Devices

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2022
Learning with error (LWE) over the ring based on binary distribution (ring-BinLWE) has become a potential Internet-of-Things (IoT) confidentiality solution with its anti-quantum attack properties and uncomplicated calculations.
Dongdong Xu   +5 more
semanticscholar   +1 more source

Design and Implementation of Encryption/Decryption Architectures for BFV Homomorphic Encryption Scheme

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2020
Fully homomorphic encryption (FHE) is a technique that allows computations on encrypted data without the need for decryption and it provides privacy in various applications such as privacy-preserving cloud computing.
A. Mert, Erdinç Öztürk, E. Savaş
semanticscholar   +1 more source

Phase‐Transition‐Triggered Optical Switching for Multistage Information Encryption/Decryption

Advanced Optical Materials, 2022
It remains challenging to enable the optical switching for safety‐improved information encryption/decryption on a gel platform. Herein, a water swelling‐induced optical‐switching strategy is reported that can achieve multistage information encryption ...
Mengda Xu   +4 more
semanticscholar   +1 more source

RACE: RISC-V SoC for En/decryption Acceleration on the Edge for Homomorphic Computation

International Symposium on Low Power Electronics and Design, 2022
As more and more edge devices connect to the cloud to use its storage and compute capabilities, they bring in security and data privacy concerns. Homomorphic Encryption (HE) is a promising solution to maintain data privacy by enabling computations on the
Zahra Azad   +5 more
semanticscholar   +1 more source

Decrypting Tratto

Studio 10. Beiträge der Bernd Alois Zimmermann-Gesamtausgabe, 2023
Tratto
Felix Marzillier, Ole Jana
openaire   +1 more source

Fair-and-Exculpable-Attribute-Based Searchable Encryption With Revocation and Verifiable Outsourced Decryption Using Smart Contract

IEEE Internet of Things Journal
Users are inclined to outsource their data to the cloud due to the rapid growth of data in response to the growing use of cloud computing and the Internet of Things (IoT). One of the primary issues for users is the secure sharing of personal data. Access
Liqing Chen   +3 more
semanticscholar   +1 more source

Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract

IEEE Transactions on Dependable and Secure Computing
Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme.
Chunpeng Ge   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy