Results 31 to 40 of about 38,037 (283)
Network marketing is a trading technique that provides companies with the opportunity to increase sales. With the increasing number of Internet-based purchases, several threats are increasingly observed in this field, such as user privacy violations ...
Saeed Banaeian Far +2 more
doaj +1 more source
Forward-secure hierarchical predicate encryption [PDF]
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan +2 more
core +2 more sources
A User Behavior Measurement Method Based on Trusted Cryptography Module [PDF]
In order to meet the high level security requirement of specific application areas,based on domestic basic software and hardware platform,a user behavior measurement method is proposed.Through the combination of USBKey dual factor authentication ...
HU Jipeng,TAN Li,YANG Minghua,ZHANG Yaming
doaj +1 more source
Cloud Computing in the Quantum Era [PDF]
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa +2 more
core +2 more sources
Roadmap on optical security [PDF]
Postprint (author's final ...
Javidi, Bahram +2 more
core +2 more sources
Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges [PDF]
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that ...
Derhab, Abdelouahid +4 more
core +1 more source
A generic construction for revocable identity-based encryption with subset difference methods.
To deal with dynamically changing user's credentials in identity-based encryption (IBE), providing an efficient key revocation method is a very important issue.
Kwangsu Lee
doaj +2 more sources
The Melbourne Shuffle: Improving Oblivious Storage in the Cloud [PDF]
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Our method can be used to improve previous oblivious storage solutions for network-based
B. Pinkas +6 more
core +1 more source
Revocable hierarchical identity-based encryption
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Seo, Jae Hong, Emura, Keita
openaire +1 more source
Identity based proxy re-encryption scheme (IBPRE+) for secure cloud data sharing [PDF]
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Nie, Jinting +3 more
core +1 more source

