Results 21 to 30 of about 20,722 (263)
Cloud Computing in the Quantum Era [PDF]
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa +2 more
core +2 more sources
Toward Hierarchical Identity-Based Encryption [PDF]
We introduce the concept of hierarchical identity-based encryption (HIBE) schemes, give precise definitions of their security and mention some applications. A two-level HIBE (2-HIBE) scheme consists of a root private key generator (PKG), domain PKGs and users, all of which are associated with primitive IDs (PIDs) that are arbitrary strings.
Jeremy Horwitz, Ben Lynn
openaire +1 more source
Revocable hierarchical identity-based encryption
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Seo, Jae Hong, Emura, Keita
openaire +1 more source
The Evolution of Embedding Metadata in Blockchain Transactions [PDF]
The use of blockchains is growing every day, and their utility has greatly expanded from sending and receiving crypto-coins to smart-contracts and decentralized autonomous organizations.
Courtois, Nicolas +2 more
core +2 more sources
On Secure Workflow Decentralisation on the Internet [PDF]
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach,
Adi Shamir +28 more
core +3 more sources
Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid +4 more
core +1 more source
Efficient identity-based encryption with Hierarchical key-insulation from HIBE [PDF]
AbstractHierarchical key-insulated identity-based encryption (HKIBE) is identity-based encryption (IBE) that allows users to update their secret keys to achieve (hierarchical) key-exposure resilience, which is an important notion in practice. However, existing HKIBE constructions have limitations in efficiency: sizes of ciphertexts and secret keys ...
Keita Emura +2 more
openaire +1 more source
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user ...
Jiawei ZHANG +3 more
doaj +2 more sources
Fog computing complements cloud computing by removing several limitations, such as delays and network bandwidth. It emerged to support Internet of Things (IoT) applications wherein its computations and tasks are carried out at the network’s edge ...
Md Whaiduzzaman +5 more
doaj +1 more source
Temporal verification in secure group communication system design [PDF]
The paper discusses an experience in using a real-time UML/SysML profile and a formal verification toolkit to check a secure group communication system against temporal requirements.
Fontan, Benjamin +3 more
core +1 more source

