Results 21 to 30 of about 95,997 (171)
Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj +1 more source
A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing
Data sharing through the cloud is flourishing with the development of cloud computing technology. The new wave of technology will also give rise to new security challenges, particularly the data confidentiality in cloud-based sharing applications ...
Biwen Chen +4 more
doaj +1 more source
5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy
5G acts as a highway enabling innovative digital transformation and the Fourth Industrial Revolution in our lives. It is undeniable that the success of such a paradigm shift hinges on robust security measures.
Ilsun You +5 more
doaj +1 more source
Secure Streaming Data Encryption and Query Scheme with Electric Vehicle Key Management
The rapid proliferation of Electric Vehicle (EV) infrastructures has led to the massive generation of high-frequency streaming data uploaded to cloud platforms for real-time analysis, while such data supports intelligent energy management and behavioral ...
Zhicheng Li +5 more
doaj +1 more source
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao +5 more
doaj +1 more source
Port Forwarding Services Are Forwarding Security Risks
We conduct the first comprehensive security study on representative port forwarding services (PFS), which emerge in recent years and make the web services deployed in internal networks available on the Internet along with better usability but less complexity compared to traditional techniques (e.g., NAT traversal techniques). Our study is made possible
Wang, Haoyuan +4 more
openaire +2 more sources
In the context of new power system construction and the increasingly severe risks of urban security, urban power supply security has now become a top priority of urban security.
ZHU Chao +4 more
doaj +1 more source
An RFID Grouping-proof Protocol with Privacy Protection and Forward Security [PDF]
The Radio Frequency Identification(RFID) grouping-proof protocol is used to verify whether there are multiple tags,because in actual scenario,these tags are used for the identification of one object.However,due to the simple structure and limited ...
SHI Zhicai, WANG Yihan, ZHANG Xiaomei, CHEN Jiwei, CHEN Shanshan
doaj +1 more source
On Forward-Secure Storage [PDF]
We study a problem of secure data storage in a recently introduced Limited Communication Model. We propose a new cryptographic primitive that we call a Forward-Secure Storage (FSS). This primitive is a special kind of an encryption scheme, which produces huge (5 GB, say) ciphertexts, even from small plaintexts, and has the following non-standard ...
openaire +1 more source
A Forward-Secure Signature with Backward-Secure Detection [PDF]
In this paper, we propose a method to enhance the security of Abdalla and Reyzin 's forward-secure signature scheme, by producing a backward-secure detection. In the proposed scheme, we embedded the hash-chain into the forward-secure signature scheme. It achieves not only forward-security but also backward-security for the digital signature.
D.J. Guan, Dai-Rui Lin, Chih-I Wang
openaire +1 more source

