Results 41 to 50 of about 20,722 (263)

Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation

open access: yes, 2018
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a ...
Ling, San   +3 more
core   +1 more source

Energy efficient privacy preserved data gathering in wireless sensor networks having multiple sinks [PDF]

open access: yes, 2009
Wireless sensor networks (WSNs) generally have a many-to-one structure so that event information flows from sensors to a unique sink. In recent WSN applications, many-tomany structures are evolved due to need for conveying collected event information to ...
Bahsi, Hayretdin   +2 more
core   +1 more source

Ad Hoc Multi-Input Functional Encryption [PDF]

open access: yes, 2019
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta   +5 more
core   +2 more sources

Survey on Identity based and Hierarchical Identity based Encryption Schemes

open access: yesInternational Journal of Computer Applications, 2016
this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. First, we introduce the basic concepts of security and principles of cryptography and then move into identity-based cryptography, an overview of its development process and research progress. We
R. Sridevi, D. Kalyani
openaire   +1 more source

New Constructions of Identity-Based Dual Receiver Encryption from Lattices

open access: yesEntropy, 2020
Dual receiver encryption (DRE), being originally conceived at CCS 2004 as a proof technique, enables a ciphertext to be decrypted to the same plaintext by two different but dual receivers and becomes popular recently due to itself useful application ...
Yuan Liu   +3 more
doaj   +1 more source

Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters

open access: yesEntropy, 2020
Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting cryptographic primitives that aim at the implicit authentication on the users’ public keys by using users’ identities directly.
Yuan Zhang   +4 more
doaj   +1 more source

Organ‐specific redox imbalances in spinal muscular atrophy mice are partially rescued by SMN antisense oligonucleotides

open access: yesFEBS Letters, EarlyView.
We identified a systemic, progressive loss of protein S‐glutathionylation—detected by nonreducing western blotting—alongside dysregulation of glutathione‐cycle enzymes in both neuronal and peripheral tissues of Taiwanese SMA mice. These alterations were partially rescued by SMN antisense oligonucleotide therapy, revealing persistent redox imbalance as ...
Sofia Vrettou, Brunhilde Wirth
wiley   +1 more source

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Colorectal cancer‐derived FGF19 is a metabolically active serum biomarker that exerts enteroendocrine effects on mouse liver

open access: yesMolecular Oncology, EarlyView.
Meta‐transcriptome analysis identified FGF19 as a peptide enteroendocrine hormone associated with colorectal cancer prognosis. In vivo xenograft models showed release of FGF19 into the blood at levels that correlated with tumor volumes. Tumoral‐FGF19 altered murine liver metabolism through FGFR4, thereby reducing bile acid synthesis and increasing ...
Jordan M. Beardsley   +5 more
wiley   +1 more source

Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters [PDF]

open access: yes, 2012
In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an ...
Chen, Jie   +4 more
core  

Home - About - Disclaimer - Privacy