Results 1 to 10 of about 87,489 (286)
A framework for fire safety in Ireland [PDF]
Pete Murphy and Kirsten Greenhalgh look at some of the proposals for the future of the Fire Service in the Republic of Ireland following the Keeping Communities Safe ...
Greenhalgh, K, Murphy, P
core
A Peered Bulletin Board for Robust Use in Verifiable Voting Systems [PDF]
The Web Bulletin Board (WBB) is a key component of verifiable election systems. It is used in the context of election verification to publish evidence of voting and tallying that voters and officials can check, and where challenges can be launched in the
Culnane, Chris, Schneider, Steve
core +2 more sources
CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority [PDF]
For the attribute-based encryption scheme,a single authority has the problem of low efficiency and easy disclosure of user keys.Through the establishment of a decentralized attribute authority and agent reencryption technology,a Ciphertext-policy ...
ZHANG Yulei,LIU Wenjing,MA Yanli,WANG Caifen
doaj +1 more source
Multi-authority attribute-based encryption with efficient revocation
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from ...
Kai ZHANG +4 more
doaj +2 more sources
Forward-secure hierarchical predicate encryption [PDF]
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan +2 more
core +2 more sources
How to manage a multi-author megapaper [PDF]
Large teams can produce more impactful work, but organizing a paper produced by many can be a major challenge. Large teams can produce more impactful work, but organizing a paper produced by many can be a major challenge.
openaire +1 more source
Multi-authority attribute-based encryption scheme with policy dynamic updating
Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute ...
Xi-xi YAN +3 more
doaj +2 more sources
In search of an optimal design for European gas markets [PDF]
The liberalisation of the European gas market is becalmed. Meanwhile\ud regulatory uncertainty looms on the investment horizon.\ud During the last ten years, European gas markets have gone through profound restructuring processes.
Bressers, Hans, Haase, Nadine
core +1 more source
Smart, secure and seamless access control scheme for mobile devices [PDF]
Smart devices capture users' activity such as unlock failures, application usage, location and proximity of devices in and around their surrounding environment. This activity information varies between users and can be used as digital fingerprints of the
Phan, R. C. W. +2 more
core +2 more sources
Cloud Access Control Scheme Supporting Multi-authority Centers and Attribute Change [PDF]
The traditional Ciphertextpolicy Attribute-based Encryption(CP-ABE) systems are based on singleauthority organization,and most of them have the problems of large computation cost,low key maintenance efficiency,and inability to achieve anti-conspiracy ...
YANG Xiaodong,AN Faying,YANG Miaomiao,YANG Ping,WANG Caifen
doaj +1 more source

