Results 31 to 40 of about 38,037 (283)

ACR-MLM: a privacy-preserving framework for anonymous and confidential rewarding in blockchain-based multi-level marketing

open access: yesData Science and Management, 2022
Network marketing is a trading technique that provides companies with the opportunity to increase sales. With the increasing number of Internet-based purchases, several threats are increasingly observed in this field, such as user privacy violations ...
Saeed Banaeian Far   +2 more
doaj   +1 more source

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

A User Behavior Measurement Method Based on Trusted Cryptography Module [PDF]

open access: yesJisuanji gongcheng, 2017
In order to meet the high level security requirement of specific application areas,based on domestic basic software and hardware platform,a user behavior measurement method is proposed.Through the combination of USBKey dual factor authentication ...
HU Jipeng,TAN Li,YANG Minghua,ZHANG Yaming
doaj   +1 more source

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

Roadmap on optical security [PDF]

open access: yes, 2016
Postprint (author's final ...
Javidi, Bahram   +2 more
core   +2 more sources

Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]

open access: yes, 2020
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid   +4 more
core   +1 more source

A generic construction for revocable identity-based encryption with subset difference methods.

open access: yesPLoS ONE, 2020
To deal with dynamically changing user's credentials in identity-based encryption (IBE), providing an efficient key revocation method is a very important issue.
Kwangsu Lee
doaj   +2 more sources

The Melbourne Shuffle: Improving Oblivious Storage in the Cloud [PDF]

open access: yes, 2014
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Our method can be used to improve previous oblivious storage solutions for network-based
B. Pinkas   +6 more
core   +1 more source

Revocable hierarchical identity-based encryption

open access: yesTheoretical Computer Science, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Seo, Jae Hong, Emura, Keita
openaire   +1 more source

Identity based proxy re-encryption scheme (IBPRE+) for secure cloud data sharing [PDF]

open access: yes, 2016
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Nie, Jinting   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy