Results 41 to 50 of about 38,037 (283)
The Evolution of Embedding Metadata in Blockchain Transactions [PDF]
The use of blockchains is growing every day, and their utility has greatly expanded from sending and receiving crypto-coins to smart-contracts and decentralized autonomous organizations.
Courtois, Nicolas +2 more
core +2 more sources
On Secure Workflow Decentralisation on the Internet [PDF]
Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach,
Adi Shamir +28 more
core +3 more sources
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user ...
Jiawei ZHANG +3 more
doaj +2 more sources
Fog computing complements cloud computing by removing several limitations, such as delays and network bandwidth. It emerged to support Internet of Things (IoT) applications wherein its computations and tasks are carried out at the network’s edge ...
Md Whaiduzzaman +5 more
doaj +1 more source
With the maturity of technologies such as Internet of Things (IoT) and Cloud Computing, more and more medical institutions share patient's medical data in the IoT-connected healthcare system, whereas it also brings hidden dangers to data security and ...
Xi Chen +3 more
doaj +1 more source
Ad Hoc Multi-Input Functional Encryption [PDF]
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta +5 more
core +2 more sources
Hierarchical Identity-Based Online/Offline Encryption
The notion of identity-based online/offline encryption (IBOOE) was recently introduced by Guo, Mu and Chen in FC 2008. In an IBOOE system, the encryption is split into online and offline phases. The offline phase is performed prior to the arrival of a message and the recipient's public key (or,identity).
Zhongren Liu +4 more
openaire +2 more sources
Accountable and Verifiable Outsourced Hierarchical Attribute Encryption Scheme Based on Blockchain [PDF]
With the advent of the big data era, the proliferation of information types has increased the requirements for controlled data sharing. Decentralized Attribute-Based Encryption (DABE) has been widely studied in this context to enable fine-grained access ...
JIANG Qiqi, ZHANG Liang, PENG Lingqi, KAN Haibin
doaj +1 more source
Hierarchical blockchain structure for node authentication in IoT networks
Internet of Things (IoT) networks are large peer-to-peer networks of small devices that require a competent security system that is scalable and adaptable to the limited resources of the IoT devices. Node authentication is a crucial part of IoT security.
Mahmoud Tayseer Al Ahmed +3 more
doaj +1 more source
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source

