Results 21 to 30 of about 20,722 (263)

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

Toward Hierarchical Identity-Based Encryption [PDF]

open access: yes, 2002
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and mention some applications. A two-level HIBE (2-HIBE) scheme consists of a root private key generator (PKG), domain PKGs and users, all of which are associated with primitive IDs (PIDs) that are arbitrary strings.
Jeremy Horwitz, Ben Lynn
openaire   +1 more source

Revocable hierarchical identity-based encryption

open access: yesTheoretical Computer Science, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Seo, Jae Hong, Emura, Keita
openaire   +1 more source

The Evolution of Embedding Metadata in Blockchain Transactions [PDF]

open access: yes, 2018
The use of blockchains is growing every day, and their utility has greatly expanded from sending and receiving crypto-coins to smart-contracts and decentralized autonomous organizations.
Courtois, Nicolas   +2 more
core   +2 more sources

On Secure Workflow Decentralisation on the Internet [PDF]

open access: yes, 2010
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach,
Adi Shamir   +28 more
core   +3 more sources

Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]

open access: yes, 2020
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid   +4 more
core   +1 more source

Efficient identity-based encryption with Hierarchical key-insulation from HIBE [PDF]

open access: yesDesigns, Codes and Cryptography, 2021
AbstractHierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that allows users to update their secret keys to achieve (hierarchical) key-exposure resilience, which is an important notion in practice. However, existing HKIBE constructions have limitations in efficiency: sizes of ciphertexts and secret keys ...
Keita Emura   +2 more
openaire   +1 more source

Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing

open access: yesTongxin xuebao, 2021
General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user ...
Jiawei ZHANG   +3 more
doaj   +2 more sources

BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture

open access: yesIEEE Access, 2021
Fog computing complements cloud computing by removing several limitations, such as delays and network bandwidth. It emerged to support Internet of Things (IoT) applications wherein its computations and tasks are carried out at the network’s edge ...
Md Whaiduzzaman   +5 more
doaj   +1 more source

Temporal verification in secure group communication system design [PDF]

open access: yes, 2007
The paper discusses an experience in using a real-time UML/SysML profile and a formal verification toolkit to check a secure group communication system against temporal requirements.
Fontan, Benjamin   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy