Results 21 to 30 of about 87,489 (286)

Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing

open access: yesIEEE Access, 2019
Fog computing enables computation, storage, applications, and network services between the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to the edge of the network.
Dawei Li   +3 more
doaj   +1 more source

AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption [PDF]

open access: yes, 2013
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned
Jung, Taeho   +3 more
core   +1 more source

Robust and Scalable Data Access Control in D2D Communications

open access: yesIEEE Access, 2018
As an emerging technique in 5G cellular networks, D2D communication efficiently utilizes the available resources. However, the concerns of data security, identity privacy, and system scalability have not been sufficiently addressed.
Qi Li   +4 more
doaj   +1 more source

Key-Policy Multi-authority Attribute-Based Encryption [PDF]

open access: yes, 2015
12 ...
Longo, Riccardo   +2 more
openaire   +4 more sources

An Enhanced Approach for CP-ABE with Proxy Re-encryption in IoT Paradigm

open access: yesJordanian Journal of Computers and Information Technology, 2022
In Internet of Things (IoT), encryption is a technique in which plaintext is converted to ciphertext to make it non-recovered by the attacker without secret key.
Nishant Doshi
doaj   +1 more source

Attribute-Based Encryption Scheme for Edge Computing [PDF]

open access: yesJisuanji gongcheng, 2021
When existing Attribute-Based Encryption(ABE) schemes for traditional cloud environment determine the access rights of users,they consider only general attributes such as occupation and age,ignoring time and location constraints,which makes them fail to ...
PENG Hongyan, LING Jiao, QIN Shaohua, DENG Jianfeng
doaj   +1 more source

Multi-authority Access Control Scheme in Cloud Environment

open access: yesJisuanji kexue yu tansuo, 2020
Ciphertext-policy attribute-based encryption (CP-ABE) is very suitable for data access control in cloud environment. The existing CP-ABE algorithm does not consider that the access structure of multiple files has a hierarchical relationship, and it needs
ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang
doaj   +1 more source

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption [PDF]

open access: yes, 2015
Decentralized attribute-based encryption (ABE) is a variant of multi-authority based ABE whereby any attribute authority (AA) can independently join and leave the system without collaborating with the existing AAs.
Han, J.   +5 more
core   +1 more source

Guidelines for improvement of the procedural aspects of devices and surgical instruments in the operating theatre

open access: yesFrontiers in Surgery, 2023
Surgical site infections are a major complication for patients undergoing surgical treatment and a significant cause of mortality and morbidity. Many international guidelines suggest measures for the prevention of surgical site infections (SSI) in ...
P. G. Calò   +16 more
doaj   +1 more source

Flexible and Efficient Blockchain-Based ABE Scheme With Multi-Authority for Medical on Demand in Telemedicine System

open access: yesIEEE Access, 2019
Telemedicine offers a medical-on-demand (MoD) service from a distance. This technology is designed to overcome distance barriers and improve the process of accessing medical services in distant rural communities.
Rui Guo   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy