Results 51 to 60 of about 38,037 (283)

Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications

open access: yesIEEE Access, 2019
In the era of big data, cloud-based industrial applications can provide available and convenient data access for resource-constrained smart devices. Attribute-based encryption can be used to ensure data security while providing fine-grained data access ...
Qian Zhang   +4 more
doaj   +1 more source

Identity Based Group Signatures from Hierarchical Identity-Based Encryption [PDF]

open access: yes, 2009
A number of previous papers explored the notion of identity-based group signature. We present a generic construction of identity-based group signatures. Our construction is based on the Naor transformation of a identity-based signature out of an identity-based encryption, adjusted to hierarchical identity-based encryption.
Nigel P. Smart, Bogdan Warinschi
openaire   +1 more source

Zero trust anonymous access algorithm for multi cloud storage system based on CP-ABE

open access: yesEgyptian Informatics Journal
This paper proposes a zero-trust anonymous access algorithm for multi-cloud storage systems based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption).
Jun Tian
doaj   +1 more source

ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments

open access: yesFrontiers in Blockchain, 2020
Recent years have witnessed the trend of increasingly relying on remote and distributed infrastructures, mainly owned and managed by third parties. This increased the number of reported incidents of security breaches compromising users' personal data ...
Nesrine Kaaniche   +4 more
doaj   +1 more source

Secure Personal Content Networking over Untrusted Devices

open access: yes, 2014
Securely sharing and managing personal content is a challenging task in multi-device environments. In this paper, we design and implement a new platform called Personal Content Networking (PCN).
Joy, Joshua, Lee, Uichin, Noh, Youngtae
core   +1 more source

Enabling Practical IPsec authentication for the Internet [PDF]

open access: yes, 2006
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on Information Security (IS'06), OTM Federated Conferences and workshops). Montpellier, Oct,/Nov.
Delgado Kloos, Carlos   +3 more
core   +3 more sources

New Constructions of Identity-Based Dual Receiver Encryption from Lattices

open access: yesEntropy, 2020
Dual receiver encryption (DRE), being originally conceived at CCS 2004 as a proof technique, enables a ciphertext to be decrypted to the same plaintext by two different but dual receivers and becomes popular recently due to itself useful application ...
Yuan Liu   +3 more
doaj   +1 more source

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment [PDF]

open access: yes, 2012
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services.
Dimitrakos, T.   +4 more
core   +1 more source

Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters

open access: yesEntropy, 2020
Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting cryptographic primitives that aim at the implicit authentication on the users’ public keys by using users’ identities directly.
Yuan Zhang   +4 more
doaj   +1 more source

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Home - About - Disclaimer - Privacy