Results 11 to 20 of about 83,666 (156)
Robust and Scalable Data Access Control in D2D Communications
As an emerging technique in 5G cellular networks, D2D communication efficiently utilizes the available resources. However, the concerns of data security, identity privacy, and system scalability have not been sufficiently addressed.
Qi Li +4 more
doaj +1 more source
Key-Policy Multi-authority Attribute-Based Encryption [PDF]
12 ...
Longo, Riccardo +2 more
openaire +4 more sources
An Enhanced Approach for CP-ABE with Proxy Re-encryption in IoT Paradigm
In Internet of Things (IoT), encryption is a technique in which plaintext is converted to ciphertext to make it non-recovered by the attacker without secret key.
Nishant Doshi
doaj +1 more source
Attribute-Based Encryption Scheme for Edge Computing [PDF]
When existing Attribute-Based Encryption(ABE) schemes for traditional cloud environment determine the access rights of users,they consider only general attributes such as occupation and age,ignoring time and location constraints,which makes them fail to ...
PENG Hongyan, LING Jiao, QIN Shaohua, DENG Jianfeng
doaj +1 more source
Multi-authority Access Control Scheme in Cloud Environment
Ciphertext-policy attribute-based encryption (CP-ABE) is very suitable for data access control in cloud environment. The existing CP-ABE algorithm does not consider that the access structure of multiple files has a hierarchical relationship, and it needs
ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang
doaj +1 more source
Surgical site infections are a major complication for patients undergoing surgical treatment and a significant cause of mortality and morbidity. Many international guidelines suggest measures for the prevention of surgical site infections (SSI) in ...
P. G. Calò +16 more
doaj +1 more source
Telemedicine offers a medical-on-demand (MoD) service from a distance. This technology is designed to overcome distance barriers and improve the process of accessing medical services in distant rural communities.
Rui Guo +5 more
doaj +1 more source
Trends in Multi-Authored Papers in Economics [PDF]
This paper looks at the growth of multiple-authored papers in eight leading economics journals. In 1950, multiple authorship was a relative rarity. By the 1990s, it had become commonplace. An empirical analysis suggests that this growth has not been even over time but appears to have been greatest in the mid-1960s and again since the mid-1970s ...
openaire +2 more sources
Multi-authority Decentralized Attribute-Based Authorization Framework [PDF]
The advancement in collaborative work among multiple institutions results in tremendous data sharing and, at the same time raises concerns about data security and privacy. Current systems are mostly built upon a centralized model, so the system requires one authority to concede another authority or mitigate trust to a trusted third party.In this paper,
Kimheng Sok, Jean Noël Colin, Kimtho Po
openaire +2 more sources
A Secure and Optimally Efficient Multi-Authority Election Scheme [PDF]
AbstractIn this paper we present a new multi‐authority secret‐ballot election scheme that guarantees privacy, universal veriability, and robustness. It is the first scheme for which the performance is optimal in the sense that time and communication complexity is minimal both for the individual voters and the authorities. An interesting property of the
Cramer, R. +2 more
openaire +2 more sources

