Results 21 to 30 of about 87,489 (286)
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing
Fog computing enables computation, storage, applications, and network services between the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to the edge of the network.
Dawei Li +3 more
doaj +1 more source
AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption [PDF]
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned
Jung, Taeho +3 more
core +1 more source
Robust and Scalable Data Access Control in D2D Communications
As an emerging technique in 5G cellular networks, D2D communication efficiently utilizes the available resources. However, the concerns of data security, identity privacy, and system scalability have not been sufficiently addressed.
Qi Li +4 more
doaj +1 more source
Key-Policy Multi-authority Attribute-Based Encryption [PDF]
12 ...
Longo, Riccardo +2 more
openaire +4 more sources
An Enhanced Approach for CP-ABE with Proxy Re-encryption in IoT Paradigm
In Internet of Things (IoT), encryption is a technique in which plaintext is converted to ciphertext to make it non-recovered by the attacker without secret key.
Nishant Doshi
doaj +1 more source
Attribute-Based Encryption Scheme for Edge Computing [PDF]
When existing Attribute-Based Encryption(ABE) schemes for traditional cloud environment determine the access rights of users,they consider only general attributes such as occupation and age,ignoring time and location constraints,which makes them fail to ...
PENG Hongyan, LING Jiao, QIN Shaohua, DENG Jianfeng
doaj +1 more source
Multi-authority Access Control Scheme in Cloud Environment
Ciphertext-policy attribute-based encryption (CP-ABE) is very suitable for data access control in cloud environment. The existing CP-ABE algorithm does not consider that the access structure of multiple files has a hierarchical relationship, and it needs
ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang
doaj +1 more source
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption [PDF]
Decentralized attribute-based encryption (ABE) is a variant of multi-authority based ABE whereby any attribute authority (AA) can independently join and leave the system without collaborating with the existing AAs.
Han, J. +5 more
core +1 more source
Surgical site infections are a major complication for patients undergoing surgical treatment and a significant cause of mortality and morbidity. Many international guidelines suggest measures for the prevention of surgical site infections (SSI) in ...
P. G. Calò +16 more
doaj +1 more source
Telemedicine offers a medical-on-demand (MoD) service from a distance. This technology is designed to overcome distance barriers and improve the process of accessing medical services in distant rural communities.
Rui Guo +5 more
doaj +1 more source

