Results 21 to 30 of about 386,205 (300)

Efficient proof of ownership for cloud storage systems [PDF]

open access: yesAIP Conference Proceedings, 2017
Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file.
Weiwei Zhong, Zhusong Liu
openaire   +1 more source

Novel Designated Ownership Transfer with Grouping Proof

open access: yesApplied Sciences, 2019
In the supply chain management literature, various mobile radio frequency identification (RFID) protocols have been proposed for minimizing cargo theft during transport while ensuring the integrity of the entire cargo load or transferring ownership of a ...
Kuo-Yu Tsai   +3 more
doaj   +1 more source

Proof of Luck: an Efficient Blockchain Consensus Protocol [PDF]

open access: yes, 2017
In the paper, we present designs for multiple blockchain consensus primitives and a novel blockchain system, all based on the use of trusted execution environments (TEEs), such as Intel SGX-enabled CPUs.
Castro M.   +4 more
core   +2 more sources

Boosting efficiency and security in proof of ownership for deduplication [PDF]

open access: yesProceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012
Deduplication is a technique used to reduce the amount of storage needed by service providers. It is based on the intuition that several users may want (for different reasons) to store the same content. Hence, storing a single copy of these files is sufficient.
DI PIETRO, ROBERTO, Sorniotti A.
openaire   +2 more sources

Proof of cipher text ownership based on convergence encryption [PDF]

open access: yesAIP Conference Proceedings, 2017
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements
Weiwei Zhong, Zhusong Liu
openaire   +1 more source

An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj   +1 more source

Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders

open access: yesJournal of Information Security and Applications, 2023
Marca de agua modelo La marca de agua modelo es un método para incrustar información de marca de agua en un modelo de red neuronal. Demuestra la propiedad del modelo sin afectar a su rendimiento. Dado que hay muchos ataques contra la poda de modelos, es más importante diseñar algoritmos de marcas de agua de modelos contra la poda. En este documento, se
Li Li   +5 more
openaire   +1 more source

Secure Encrypted Data With Authorized Deduplication in Cloud

open access: yesIEEE Access, 2019
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong   +4 more
doaj   +1 more source

Letter C Document as a Preliminary Evidence of Ownership of Land Rights (Study in Kebumen District, Indonesia)

open access: yesJournal of Law and Legal Reform, 2021
Land is the main need for humans because human life cannot be separated from the soil. The Indonesian state is increasingly experiencing developments in the arrangement of land ownership rights, which is followed by the issuance of regulations governing ...
Paryanto Paryanto
doaj   +1 more source

Beyond the bubble: Will NFTs and digital proof of ownership empower creative industry entrepreneurs? [PDF]

open access: yesJournal of Business Venturing Insights, 2022
Non-fungible Tokens (NFTs) are blockchain-enabled cryptographic assets that represent proof-of-ownership for digital objects. The use of NFTs has been pioneered by creative industry entrepreneurs who have sought to generate new revenue streams and modes of stakeholder engagement.
Chalmers, Dominic   +4 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy