Results 31 to 40 of about 87,489 (286)
Trends in Multi-Authored Papers in Economics [PDF]
This paper looks at the growth of multiple-authored papers in eight leading economics journals. In 1950, multiple authorship was a relative rarity. By the 1990s, it had become commonplace. An empirical analysis suggests that this growth has not been even over time but appears to have been greatest in the mid-1960s and again since the mid-1970s ...
openaire +2 more sources
On the feasibility of attribute-based encryption on Internet of Things devices [PDF]
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M +6 more
core +3 more sources
Multi-authority Decentralized Attribute-Based Authorization Framework [PDF]
The advancement in collaborative work among multiple institutions results in tremendous data sharing and, at the same time raises concerns about data security and privacy. Current systems are mostly built upon a centralized model, so the system requires one authority to concede another authority or mitigate trust to a trusted third party.In this paper,
Kimheng Sok, Jean Noël Colin, Kimtho Po
openaire +2 more sources
A Secure and Optimally Efficient Multi-Authority Election Scheme [PDF]
AbstractIn this paper we present a new multi‐authority secret‐ballot election scheme that guarantees privacy, universal veriability, and robustness. It is the first scheme for which the performance is optimal in the sense that time and communication complexity is minimal both for the individual voters and the authorities. An interesting property of the
Cramer, R. +2 more
openaire +2 more sources
Ad Hoc Multi-Input Functional Encryption [PDF]
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta +5 more
core +2 more sources
PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT [PDF]
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly ...
Attia, R +4 more
core +5 more sources
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
An efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the ...
Liang-xuan ZHANG,Hui LI
doaj +1 more source
Nowadays, secure data access control has become one of the major concerns in a cloud storage system. As a logical combination of attribute-based encryption and attribute-based signature, attribute-based signcryption (ABSC) can provide confidentiality and
Qian Xu +5 more
doaj +1 more source
The Dilemma Between Fiscal Decentralization and Budget Balance
This paper explores the effects of the distribution of fiscal authority for fiscal decentralization on the U.S. state budget balance. Numerous scholars have pointed out that fiscal institutions play an important role in achieving budget balance, but ...
Jongmin Shon
doaj +1 more source
Multi-authority Attribute-based Encryption Scheme with Policy Hiding [PDF]
Most existing attribute-based encryption schemes of hidden policies are directed to a single authority,without taking into account the situation where the users’ attributes are managed by multi-authority,having the problems such as low-efficient of key ...
FAN Yundong,WU Xiaoping
doaj +1 more source

