Results 21 to 30 of about 1,436,143 (281)
Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage
Collusion between revoked users and cloud service providers can pose a threat to the security of cloud storage data. If the original legitimate users cannot be revoked securely, it will lead to the leakage of shared data, thus affecting the security of ...
Yinghui Zhang +4 more
doaj +1 more source
AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs
As special ad-hoc networks, vehicular ad-hoc networks (VANETs) support vehicles to communicate with each other via opportunistic wireless links. In order to protect privacy of drivers, vehicles registered in VANETs are required to authenticate and ...
Yanji Jiang, Shaocheng Ge, Xueli Shen
doaj +1 more source
Healthchain: A Privacy Protection System for Medical Data Based on Blockchain
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the ...
Baocheng Wang, Zetao Li
doaj +1 more source
The Novikov conjecture on Cheeger spaces [PDF]
We prove the Novikov conjecture on oriented Cheeger spaces whose fundamental group satisfies the strong Novikov conjecture. A Cheeger space is a stratified pseudomanifold admitting, through a choice of ideal boundary conditions, an L2-de Rham cohomology ...
Albin, Pierre +3 more
core +4 more sources
Universally Composable Group Signature Protocol [PDF]
At present,most group signature is only secure in the standard alone.Its security becomes weak in multiple protocol environment.In view of this,the security of group signature protocol is studied in the multiple concurrent execution under the universally
ZHAO Chen,YU Huifang,LI Jianmin
doaj +1 more source
Privacy-Enhancing Group Signcryption Scheme
In the last decades, several signcryption schemes have been developed for different privacy-enhancing purposes. In this paper, we propose a new privacy-enhancing group signcryption scheme that provides: unforgeability, confidentiality, ciphertext and ...
Sara Ricci +3 more
doaj +1 more source
We consider supersymmetry algebras in space-times with arbitrary signature and minimal number of spinor generators. The interrelation between super Poincar\'e and super conformal algebras is elucidated.
Andrianopoli +28 more
core +2 more sources
Group actions and higher signatures [PDF]
Let π be a nontrivial finite group and M be a closed manifold. An interesting question is whether or not M has the R -homology type of a manifold admitting a free π action. Here this problem is studied for actions that are “homologically trivial.” If π 1
openaire +2 more sources
A traceable group signature scheme
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Jonathan Jen-Rong, Liu, Yuanchi
openaire +1 more source
With the advent of smart cities, the significance of the Internet of Things (IoT) is gaining greater prominence. At the same time, the safety early warning system in the IoT has a significant impact on real-time monitoring and the response to potential ...
Jianfeng Li +5 more
doaj +1 more source

