Results 41 to 50 of about 87,489 (286)

A Survey of Access Control Models in Wireless Sensor Networks [PDF]

open access: yes, 2014
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B.   +3 more
core   +2 more sources

Multi-Authority Secret-Ballot Elections with Linear Work [PDF]

open access: yes, 1996
We present new cryptographic protocols for multi-authority secret ballot elections that guarantee privacy, robustness, and univer- sal verifiability. Application of some novel techniques, in particular the construction of witness hiding/indistinguishable protocols from Cramer, Damgård and Schoenmakers, and the verifiable secret sharing scheme of ...
Cramer, R.   +3 more
openaire   +2 more sources

A multi-candidate electronic voting scheme with unlimited participants

open access: yes, 2017
In this paper a new multi-candidate electronic voting scheme is constructed with unlimited participants. The main idea is to express a ballot to allow voting for up to k out of the m candidates and unlimited participants. The purpose of vote is to select
Ding, Yong, Zhao, Quanyu, Zhao, Xi
core   +1 more source

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments [PDF]

open access: yes, 2017
Decentralized systems are a subset of distributed systems where multiple authorities control different components and no authority is fully trusted by all. This implies that any component in a decentralized system is potentially adversarial.
Danezis, George   +3 more
core   +4 more sources

Correction to “Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing”

open access: yesIEEE Access, 2019
In 2018, Yang et al. proposed a decentralized multi-authority attribute-based encryption scheme for cloud computing applications and proved its security using the dual system encryption technique. In this comment, we show that Yang et al.’s scheme
Syh-Yuan Tan
doaj   +1 more source

Financial Burden Associated With Hospitalisation Among Families of Childhood Brain Tumours in Australia

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim   +8 more
wiley   +1 more source

Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall

open access: yesIEEE Access, 2019
The revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF ...
Bo Hong   +3 more
doaj   +1 more source

Multi-authority Attribute Based Encryption [PDF]

open access: yes, 2007
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single
openaire   +1 more source

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments

open access: yesCryptography, 2018
Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms inefficient
Balaji Chandrasekaran   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy