Results 21 to 30 of about 20,376 (274)

A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment

open access: yesMathematics, 2023
In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the patient’s physiological data in a wireless sensor network. In order to prevent unwarranted users from accessing the sensor network to obtain patients’ data, designing ...
Qingyun Xie, Zixuan Ding, Qi Xie
doaj   +1 more source

Provably Secure Covert Communication on Blockchain

open access: yesCryptography, 2018
Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing number of related applications, such as smart contracts. The open nature of blockchain together
Juha Partala
doaj   +1 more source

Efficient Side-Channel Secure Message Authentication with Better Bounds

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We investigate constructing message authentication schemes from symmetric cryptographic primitives, with the goal of achieving security when most intermediate values during tag computation and verification are leaked (i.e., mode-level leakage-resilience).
Chun Guo   +3 more
doaj   +1 more source

Provably Secure Identity-based Conditional Proxy Re-encryption Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
The conditional proxy re-encryption based on the traditional public key cryptosystem is mature,but the Identity-based Proxy Re-encryption(IBPRE) scheme,controlling agents’ permissions from the fine-grained level is a problem needed to be solved.Thus,this
YE Weiwei,OU Qingyu,WEI Wei
doaj   +1 more source

Provably Secure Reflection Ciphers

open access: yes, 2022
sponsorship: This work was supported in part by the Research Council KU Leuven: GOA TENSE (C16/15/058). Tim Beyne and Yu Long Chen are supported by a Ph.D. Fellowship from the Research Foundation -Flanders (FWO). The authors thank the reviewers for their valuable comments and suggestions.
Beyne, Tim, Chen, Yu Long
openaire   +1 more source

GUC-secure protocol for private relational join operator computing

open access: yesTongxin xuebao, 2014
It is one of important applications of secure multiparty computation that privacy-preserving SQL computation in distributed relational database.There are only few works dealing with provably-secure privacy-preserving data manipulations in contrast with ...
Yuan TIAN, Rong-xin SUN, Wu-yang CAI
doaj   +2 more sources

Provably secure Rabin-p cryptosystem in hybrid setting [PDF]

open access: yes, 2016
In this work, we design an efficient and provably secure hybrid cryptosystem depicted by a combination of the Rabin-p cryptosystem with an appropriate symmetric encryption scheme.
Asbullah, Muhammad Asyraf   +1 more
core   +1 more source

Strong and Provably Secure Database Access Control

open access: yes, 2015
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints.
Basin, David   +2 more
core   +1 more source

Emergent Behavior in Cybersecurity [PDF]

open access: yes, 2014
We argue that emergent behavior is inherent to cybersecurity.Comment: 2 pages, HotSoS'2014 (2014 Symposium and Bootcamp on the Science of ...
Xu, Shouhuai
core   +1 more source

DeepSecure: Scalable Provably-Secure Deep Learning [PDF]

open access: yes, 2017
This paper proposes DeepSecure, a novel framework that enables scalable execution of the state-of-the-art Deep Learning (DL) models in a privacy-preserving setting. DeepSecure targets scenarios in which neither of the involved parties including the cloud
Koushanfar, Farinaz   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy