Results 1 to 10 of about 87,489 (286)

A framework for fire safety in Ireland [PDF]

open access: yes, 2013
Pete Murphy and Kirsten Greenhalgh look at some of the proposals for the future of the Fire Service in the Republic of Ireland following the Keeping Communities Safe ...
Greenhalgh, K, Murphy, P
core  

A Peered Bulletin Board for Robust Use in Verifiable Voting Systems [PDF]

open access: yes, 2014
The Web Bulletin Board (WBB) is a key component of verifiable election systems. It is used in the context of election verification to publish evidence of voting and tallying that voters and officials can check, and where challenges can be launched in the
Culnane, Chris, Schneider, Steve
core   +2 more sources

CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority [PDF]

open access: yesJisuanji gongcheng, 2018
For the attribute-based encryption scheme,a single authority has the problem of low efficiency and easy disclosure of user keys.Through the establishment of a decentralized attribute authority and agent reencryption technology,a Ciphertext-policy ...
ZHANG Yulei,LIU Wenjing,MA Yanli,WANG Caifen
doaj   +1 more source

Multi-authority attribute-based encryption with efficient revocation

open access: yesTongxin xuebao, 2017
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from ...
Kai ZHANG   +4 more
doaj   +2 more sources

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

How to manage a multi-author megapaper [PDF]

open access: yesNature, 2019
Large teams can produce more impactful work, but organizing a paper produced by many can be a major challenge. Large teams can produce more impactful work, but organizing a paper produced by many can be a major challenge.
openaire   +1 more source

Multi-authority attribute-based encryption scheme with policy dynamic updating

open access: yesTongxin xuebao, 2017
Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute ...
Xi-xi YAN   +3 more
doaj   +2 more sources

In search of an optimal design for European gas markets [PDF]

open access: yes, 2008
The liberalisation of the European gas market is becalmed. Meanwhile\ud regulatory uncertainty looms on the investment horizon.\ud During the last ten years, European gas markets have gone through profound restructuring processes.
Bressers, Hans, Haase, Nadine
core   +1 more source

Smart, secure and seamless access control scheme for mobile devices [PDF]

open access: yes, 2016
Smart devices capture users' activity such as unlock failures, application usage, location and proximity of devices in and around their surrounding environment. This activity information varies between users and can be used as digital fingerprints of the
Phan, R. C. W.   +2 more
core   +2 more sources

Cloud Access Control Scheme Supporting Multi-authority Centers and Attribute Change [PDF]

open access: yesJisuanji gongcheng, 2018
The traditional Ciphertextpolicy Attribute-based Encryption(CP-ABE) systems are based on singleauthority organization,and most of them have the problems of large computation cost,low key maintenance efficiency,and inability to achieve anti-conspiracy ...
YANG Xiaodong,AN Faying,YANG Miaomiao,YANG Ping,WANG Caifen
doaj   +1 more source

Home - About - Disclaimer - Privacy