Results 31 to 40 of about 87,489 (286)

Trends in Multi-Authored Papers in Economics [PDF]

open access: yesJournal of Economic Perspectives, 1996
This paper looks at the growth of multiple-authored papers in eight leading economics journals. In 1950, multiple authorship was a relative rarity. By the 1990s, it had become commonplace. An empirical analysis suggests that this growth has not been even over time but appears to have been greatest in the mid-1960s and again since the mid-1970s ...
openaire   +2 more sources

On the feasibility of attribute-based encryption on Internet of Things devices [PDF]

open access: yes, 2016
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M   +6 more
core   +3 more sources

Multi-authority Decentralized Attribute-Based Authorization Framework [PDF]

open access: yes, 2022
The advancement in collaborative work among multiple institutions results in tremendous data sharing and, at the same time raises concerns about data security and privacy. Current systems are mostly built upon a centralized model, so the system requires one authority to concede another authority or mitigate trust to a trusted third party.In this paper,
Kimheng Sok, Jean Noël Colin, Kimtho Po
openaire   +2 more sources

A Secure and Optimally Efficient Multi-Authority Election Scheme [PDF]

open access: yesEuropean Transactions on Telecommunications, 1997
AbstractIn this paper we present a new multi‐authority secret‐ballot election scheme that guarantees privacy, universal veriability, and robustness. It is the first scheme for which the performance is optimal in the sense that time and communication complexity is minimal both for the individual voters and the authorities. An interesting property of the
Cramer, R.   +2 more
openaire   +2 more sources

Ad Hoc Multi-Input Functional Encryption [PDF]

open access: yes, 2019
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta   +5 more
core   +2 more sources

PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT [PDF]

open access: yes, 2018
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly ...
Attia, R   +4 more
core   +5 more sources

Multi-authority attribute-based encryption with efficient user revocation in cloud computing

open access: yes网络与信息安全学报, 2016
An efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the ...
Liang-xuan ZHANG,Hui LI
doaj   +1 more source

Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption

open access: yesIEEE Access, 2018
Nowadays, secure data access control has become one of the major concerns in a cloud storage system. As a logical combination of attribute-based encryption and attribute-based signature, attribute-based signcryption (ABSC) can provide confidentiality and
Qian Xu   +5 more
doaj   +1 more source

The Dilemma Between Fiscal Decentralization and Budget Balance

open access: yesTransylvanian Review of Administrative Sciences, 2022
This paper explores the effects of the distribution of fiscal authority for fiscal decentralization on the U.S. state budget balance. Numerous scholars have pointed out that fiscal institutions play an important role in achieving budget balance, but ...
Jongmin Shon
doaj   +1 more source

Multi-authority Attribute-based Encryption Scheme with Policy Hiding [PDF]

open access: yesJisuanji gongcheng, 2018
Most existing attribute-based encryption schemes of hidden policies are directed to a single authority,without taking into account the situation where the users’ attributes are managed by multi-authority,having the problems such as low-efficient of key ...
FAN Yundong,WU Xiaoping
doaj   +1 more source

Home - About - Disclaimer - Privacy