Results 21 to 30 of about 1,436,143 (281)

Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage

open access: yesIEEE Access, 2019
Collusion between revoked users and cloud service providers can pose a threat to the security of cloud storage data. If the original legitimate users cannot be revoked securely, it will lead to the leakage of shared data, thus affecting the security of ...
Yinghui Zhang   +4 more
doaj   +1 more source

AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs

open access: yesIEEE Access, 2020
As special ad-hoc networks, vehicular ad-hoc networks (VANETs) support vehicles to communicate with each other via opportunistic wireless links. In order to protect privacy of drivers, vehicles registered in VANETs are required to authenticate and ...
Yanji Jiang, Shaocheng Ge, Xueli Shen
doaj   +1 more source

Healthchain: A Privacy Protection System for Medical Data Based on Blockchain

open access: yesFuture Internet, 2021
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the ...
Baocheng Wang, Zetao Li
doaj   +1 more source

The Novikov conjecture on Cheeger spaces [PDF]

open access: yes, 2016
We prove the Novikov conjecture on oriented Cheeger spaces whose fundamental group satisfies the strong Novikov conjecture. A Cheeger space is a stratified pseudomanifold admitting, through a choice of ideal boundary conditions, an L2-de Rham cohomology ...
Albin, Pierre   +3 more
core   +4 more sources

Universally Composable Group Signature Protocol [PDF]

open access: yesJisuanji gongcheng, 2017
At present,most group signature is only secure in the standard alone.Its security becomes weak in multiple protocol environment.In view of this,the security of group signature protocol is studied in the multiple concurrent execution under the universally
ZHAO Chen,YU Huifang,LI Jianmin
doaj   +1 more source

Privacy-Enhancing Group Signcryption Scheme

open access: yesIEEE Access, 2021
In the last decades, several signcryption schemes have been developed for different privacy-enhancing purposes. In this paper, we propose a new privacy-enhancing group signcryption scheme that provides: unforgeability, confidentiality, ciphertext and ...
Sara Ricci   +3 more
doaj   +1 more source

Spinor Algebras [PDF]

open access: yes, 2000
We consider supersymmetry algebras in space-times with arbitrary signature and minimal number of spinor generators. The interrelation between super Poincar\'e and super conformal algebras is elucidated.
Andrianopoli   +28 more
core   +2 more sources

Group actions and higher signatures [PDF]

open access: yesProceedings of the National Academy of Sciences, 1985
Let π be a nontrivial finite group and M be a closed manifold. An interesting question is whether or not M has the R -homology type of a manifold admitting a free π action. Here this problem is studied for actions that are “homologically trivial.” If π 1
openaire   +2 more sources

A traceable group signature scheme

open access: yesMathematical and Computer Modelling, 2000
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Jonathan Jen-Rong, Liu, Yuanchi
openaire   +1 more source

Efficient Conditional Privacy-Preserving Authentication Scheme for Safety Warning System in Edge-Assisted Internet of Things

open access: yesMathematics, 2023
With the advent of smart cities, the significance of the Internet of Things (IoT) is gaining greater prominence. At the same time, the safety early warning system in the IoT has a significant impact on real-time monitoring and the response to potential ...
Jianfeng Li   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy