The Costs of Deception: Evidence From Psychology [PDF]
Recently, it has been argued that the evidence in social science research suggests that deceiving subjects in an experiment does not lead to a significant loss of experimental control.
Andreas Ortmann, Ralph Hertwig
core
Blockchain-Based Data Access Control and Key Agreement System in IoT Environment. [PDF]
Lee J +6 more
europepmc +1 more source
An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption. [PDF]
Hu R +6 more
europepmc +1 more source
Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications. [PDF]
Sun H, Li C, Zhang J, Liang S, Huang W.
europepmc +1 more source
A Secure Data-Sharing Model Resisting Keyword Guessing Attacks in Edge–Cloud Collaboration Scenarios
In edge–cloud collaboration scenarios, data sharing is a critical technological tool, yet smart devices encounter significant challenges in ensuring data-sharing security. Attribute-based keyword search (ABKS) is employed in these contexts to facilitate fine-grained access control over shared data, allowing only users with the necessary privileges to ...
Ye Li +4 more
openaire +1 more source
Public Key Encryption with Keyword Search in Cloud: A Survey. [PDF]
Zhou Y, Li N, Tian Y, An D, Wang L.
europepmc +1 more source
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems. [PDF]
Chen Y, Dong G, Xu C, Hao Y, Zhao Y.
europepmc +1 more source
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings. [PDF]
Zhang S, Wen Q, Li W, Zhang H, Jin Z.
europepmc +1 more source
A Review of Functional Encryption in IoT Applications. [PDF]
Shahzad K, Zia T, Qazi EU.
europepmc +1 more source
Lattice-Based Searchable Encryption Scheme Against Inside Keywords Guessing Attack
Xiaoling Yu +3 more
openaire +1 more source

