Results 21 to 30 of about 386,205 (300)
Efficient proof of ownership for cloud storage systems [PDF]
Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file.
Weiwei Zhong, Zhusong Liu
openaire +1 more source
Novel Designated Ownership Transfer with Grouping Proof
In the supply chain management literature, various mobile radio frequency identification (RFID) protocols have been proposed for minimizing cargo theft during transport while ensuring the integrity of the entire cargo load or transferring ownership of a ...
Kuo-Yu Tsai +3 more
doaj +1 more source
Proof of Luck: an Efficient Blockchain Consensus Protocol [PDF]
In the paper, we present designs for multiple blockchain consensus primitives and a novel blockchain system, all based on the use of trusted execution environments (TEEs), such as Intel SGX-enabled CPUs.
Castro M. +4 more
core +2 more sources
Boosting efficiency and security in proof of ownership for deduplication [PDF]
Deduplication is a technique used to reduce the amount of storage needed by service providers. It is based on the intuition that several users may want (for different reasons) to store the same content. Hence, storing a single copy of these files is sufficient.
DI PIETRO, ROBERTO, Sorniotti A.
openaire +2 more sources
Proof of cipher text ownership based on convergence encryption [PDF]
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements
Weiwei Zhong, Zhusong Liu
openaire +1 more source
An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj +1 more source
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders
Marca de agua modelo La marca de agua modelo es un método para incrustar información de marca de agua en un modelo de red neuronal. Demuestra la propiedad del modelo sin afectar a su rendimiento. Dado que hay muchos ataques contra la poda de modelos, es más importante diseñar algoritmos de marcas de agua de modelos contra la poda. En este documento, se
Li Li +5 more
openaire +1 more source
Secure Encrypted Data With Authorized Deduplication in Cloud
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong +4 more
doaj +1 more source
Land is the main need for humans because human life cannot be separated from the soil. The Indonesian state is increasingly experiencing developments in the arrangement of land ownership rights, which is followed by the issuance of regulations governing ...
Paryanto Paryanto
doaj +1 more source
Beyond the bubble: Will NFTs and digital proof of ownership empower creative industry entrepreneurs? [PDF]
Non-fungible Tokens (NFTs) are blockchain-enabled cryptographic assets that represent proof-of-ownership for digital objects. The use of NFTs has been pioneered by creative industry entrepreneurs who have sought to generate new revenue streams and modes of stakeholder engagement.
Chalmers, Dominic +4 more
openaire +4 more sources

