Results 111 to 120 of about 83,666 (156)
Some of the next articles are maybe not open access.
Revocable Decentralized Multi-Authority Functional Encryption
2016Attribute-Based Encryption (ABE) is regarded as one of the most desirable cryptosystems realizing data security in the cloud storage systems. Functional Encryption (FE) which includes ABE and the ABE system with multiple authorities are studied actively today. However, ABE has the attribute revocation problem. In this paper, we propose a new revocation
Hikaru Tsuchida +3 more
openaire +1 more source
Truly Multi-authority ‘Prêt-à-Voter’
2017In-polling-booth electronic voting schemes are being implemented in government binding elections to enable fast tallying with end-to-end verification of the election result. One of the most significant issues with these schemes is how to print or display the ballot without jeopardising privacy.
Haines, Thomas, Boyen, Xavier
openaire +2 more sources
Fully Distributed Multi-authority Cloud Storage Model
2013 International Conference on Cloud Computing and Big Data, 2013Cloud storage is an extension concept of cloud computing and has become an interested research topic since it is convenient and cheap in many applications. In this paper, we propose a new fully distributed cloud storage model together with the attribute-based encryption technology.
Shengyan Wu, Changlu Lin, Li Xu
openaire +1 more source
E-BUS PASS MULTI AUTHORITY APPROVAL SYSTEM
Galaxy International Interdisciplinary Research Journal, 2022The project entitled “E-Bus Pass Multi Authority Approval System” is developed using VB.Net as Front end and MS SQL Server as back end. E- Bus Pass Multi Authority Approval System is useful for students who are facing problems with the current manual work of bus pass registration and renewal.
M. Madhumitha +2 more
openaire +1 more source
Revocable, Decentralized Multi-Authority Access Control System
2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion), 2018For secure, public cloud storage, an access control scheme is critical, which ought to be carefully designed to achieve fine-grained access control and support outsourceddata confidentiality. Cipher-text Policy Attribute Based Encryption (CP-ABE) is introduced as one of the most beneficial, powerful techniques that can be leveraged to construct a ...
Ruqayah R. Al-Dahhan +3 more
openaire +1 more source
Anonymous Authentication Scheme with Decentralized Multi-Authorities
2017 IEEE International Conference on Smart Computing (SMARTCOMP), 2017We propose an anonymous authentication scheme with a feature that more than one authorities such as license issuers or product providers can admit a single entity by issuing secret keys, and then the entity is able to prove that is has those secret keys associated to its identity, without a central authority.
Hiroaki Anada, Seiko Arita
openaire +1 more source
Multi-authors: A case for information management
International Journal of Information Management, 1991This paper proposes a structured framework to plan, organize and control effectively the process of preparing a multi-authored publication.
Gordon, D.S. +7 more
openaire +2 more sources
Author ranking in multi-author collaborative networks
Collnet Journal of Scientometrics and Information Management, 2016Methods for ranking authors of research publications generally attach equal value to all citations obtained for the publications. The Page Rank algorithm can be applied by treating each paper as a page and a citation as a link to bring out the differential values of citations thereby over-coming this limitation. However, the twin problems of ranking of
Chandramouli Shama Sastry +2 more
openaire +1 more source
Multi-authors' self-citation: A further impact factor bias?
Cortex, 2008Sergio Della Sala and Joanna ...
Della Sala, S., Brooks, J.
openaire +3 more sources
Efficient Multi Authority Attribute Based Signcryption
2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN), 2023S. Uma +3 more
openaire +1 more source

