Results 51 to 60 of about 4,231 (188)

A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing

open access: yesSensors, 2020
With the explosion of various mobile devices and the tremendous advancement in cloud computing technology, mobile devices have been seamlessly integrated with the premium powerful cloud computing known as an innovation paradigm named Mobile Cloud ...
Haifeng Li   +5 more
doaj   +1 more source

A Verifiable Access Control Scheme for Mobile Cloud Storage [PDF]

open access: yesJisuanji gongcheng, 2016
In order to meet the secure requirements of data sharing in mobile cloud storage environment,a verifiable access control scheme based on Ciphertext-policy Attribute-based Encryption(CP-ABE) is proposed from the aspects of data security access control and
WANG Qian,XIONG Shuming
doaj   +1 more source

Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach [PDF]

open access: yes, 2010
Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for ...
Damiani, Ernesto, Pagano, Francesco
core   +1 more source

Cloud-based Quadratic Optimization with Partially Homomorphic Encryption [PDF]

open access: yes, 2019
The development of large-scale distributed control systems has led to the outsourcing of costly computations to cloud-computing platforms, as well as to concerns about privacy of the collected sensitive data.
Alexandru, Andreea B.   +5 more
core   +2 more sources

What Are We Learning About the Research‐Practice Gap From HRD Scholars and HRD Scholar‐Practitioners?

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT The research‐practice gap (the gap) in HRD remains a significant challenge, hindering the application of academic research to practice and the integration of workplace challenges into research efforts. It is critical for HRD research to address the gap to develop evidence‐based solutions for learning and organizational performance. The purpose
Kelly Moore, Yonjoo Cho
wiley   +1 more source

Chosen-ciphertext security from subset sum [PDF]

open access: yes, 2015
We construct a public-key encryption (PKE) scheme whose security is polynomial-time equivalent to the hardness of the Subset Sum problem. Our scheme achieves the standard notion of indistinguishability against chosen-ciphertext attacks (IND-CCA) and can
A Shallue   +26 more
core   +2 more sources

Large‐Scale Distribution of Physical Data Using DNA‐of‐Things Technology in Newspaper Printing

open access: yesSmall, EarlyView.
DNA‐of‐things technology enables stable data storage in large‐scale newspaper printing, with successful retrieval of 37 kB of digital data from a single ink dot containing approximately 14 femtograms of DNA. ABSTRACT DNA represents a promising solution for high‐density and long‐term data storage. In this study, we explore the scalability and robustness
Francesca Granito   +4 more
wiley   +1 more source

Comment on “An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption”

open access: yesIEEE Access, 2020
Recently in IEEE Access (DOI: 10.1109/ACCESS.2018.2890565), Li et al. proposed a secure outsourcing algorithm for modular exponentiation in one single untrusted server model and a new method of generating transformation keys.
Zhen Guo   +3 more
doaj   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

CP‐ABE with outsourced decryption and directionally hidden policy

open access: yesSecurity and Communication Networks, 2016
AbstractCiphertext‐policy attribute‐based encryption (CP‐ABE) is a novel cryptographic primitive for access controlling. However, the existing CP‐ABE schemes are very inefficient as the decryptions involve many expensive pairing operations. Another drawback is that the access policy itself may disclose some privacies of the users.
Zhiwei Wang, Wenyang Liu
openaire   +1 more source

Home - About - Disclaimer - Privacy