Results 21 to 30 of about 95,997 (171)

Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE

open access: yesCryptography
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing

open access: yesIEEE Access, 2020
Data sharing through the cloud is flourishing with the development of cloud computing technology. The new wave of technology will also give rise to new security challenges, particularly the data confidentiality in cloud-based sharing applications ...
Biwen Chen   +4 more
doaj   +1 more source

5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy

open access: yesSensors, 2023
5G acts as a highway enabling innovative digital transformation and the Fourth Industrial Revolution in our lives. It is undeniable that the success of such a paradigm shift hinges on robust security measures.
Ilsun You   +5 more
doaj   +1 more source

Secure Streaming Data Encryption and Query Scheme with Electric Vehicle Key Management

open access: yesInformation
The rapid proliferation of Electric Vehicle (EV) infrastructures has led to the massive generation of high-frequency streaming data uploaded to cloud platforms for real-time analysis, while such data supports intelligent energy management and behavioral ...
Zhicheng Li   +5 more
doaj   +1 more source

M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices

open access: yesIEEE Access, 2018
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao   +5 more
doaj   +1 more source

Port Forwarding Services Are Forwarding Security Risks

open access: yes2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P)
We conduct the first comprehensive security study on representative port forwarding services (PFS), which emerge in recent years and make the web services deployed in internal networks available on the Internet along with better usability but less complexity compared to traditional techniques (e.g., NAT traversal techniques). Our study is made possible
Wang, Haoyuan   +4 more
openaire   +2 more sources

Deduction of urban power supply risk transmission and blocking method in the context of the new power system

open access: yesZhejiang dianli, 2022
In the context of new power system construction and the increasingly severe risks of urban security, urban power supply security has now become a top priority of urban security.
ZHU Chao   +4 more
doaj   +1 more source

An RFID Grouping-proof Protocol with Privacy Protection and Forward Security [PDF]

open access: yesJisuanji gongcheng, 2020
The Radio Frequency Identification(RFID) grouping-proof protocol is used to verify whether there are multiple tags,because in actual scenario,these tags are used for the identification of one object.However,due to the simple structure and limited ...
SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Jiwei, CHEN Shanshan
doaj   +1 more source

On Forward-Secure Storage [PDF]

open access: yes, 2006
We study a problem of secure data storage in a recently introduced Limited Communication Model. We propose a new cryptographic primitive that we call a Forward-Secure Storage (FSS). This primitive is a special kind of an encryption scheme, which produces huge (5 GB, say) ciphertexts, even from small plaintexts, and has the following non-standard ...
openaire   +1 more source

A Forward-Secure Signature with Backward-Secure Detection [PDF]

open access: yes2008 International Conference on Information Security and Assurance (isa 2008), 2008
In this paper, we propose a method to enhance the security of Abdalla and Reyzin 's forward-secure signature scheme, by producing a backward-secure detection. In the proposed scheme, we embedded the hash-chain into the forward-secure signature scheme. It achieves not only forward-security but also backward-security for the digital signature.
D.J. Guan, Dai-Rui Lin, Chih-I Wang
openaire   +1 more source

Home - About - Disclaimer - Privacy