Results 41 to 50 of about 19,760 (270)

Resplittable threshold multi-broker proxy re-encryption scheme from lattices

open access: yesTongxin xuebao, 2017
Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the ...
Ju-yan LI, Chun-guang MA, Qian ZHAO
doaj   +2 more sources

Shared and Searchable Encrypted Data for Untrusted Servers [PDF]

open access: yes, 2008
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +3 more sources

A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme

open access: yesInformation, 2023
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine-
Tao Feng, Dewei Wang, Renbin Gong
doaj   +1 more source

Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]

open access: yes, 2014
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa   +4 more
core   +3 more sources

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Attribute-based proxy re-encryption scheme with multiple features

open access: yesTongxin xuebao, 2019
A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to ...
Chaosheng FENG   +4 more
doaj   +2 more sources

Proxy Re-Encryption Scheme for Decentralized Storage Networks

open access: yesApplied Sciences, 2022
Storage is a promising application for permission-less blockchains. Before blockchain, cloud storage was hosted by a trusted service provider. The centralized system controls the permission of the data access. In web3, users own their data.
Jia Kan, Jie Zhang, Dawei Liu, Xin Huang
doaj   +1 more source

Longitude : a privacy-preserving location sharing protocol for mobile applications [PDF]

open access: yes, 2011
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern.
A. Beresford   +14 more
core   +1 more source

Prenucleation Species Dictate Foreign Ion Incorporation in the Biomineral Precursor Amorphous Calcium Carbonate

open access: yesAdvanced Functional Materials, EarlyView.
ACC forms via aggregating prenucleation clusters that gatekeep its chemical composition. Ion identity steers the path: Ba and Sr substitute Ca in clusters, thereby inhibiting nucleation, with a dose‐dependent switch of Sr to induction. Mg partitions into Mg‐rich and Mg‐poor clusters; the latter form ACC, expelling Mg.
Qianyu Zhao   +9 more
wiley   +1 more source

Proxy Re-Encryption Scheme Supporting Keyword Search in Email System [PDF]

open access: yesJisuanji gongcheng, 2020
To authorize others to deal with encrypted mails and enable the search of encrypted mails in an encrypted email system,this paper proposes a proxy re-encryption scheme that supports keyword search for email systems.In this scheme,searchable encryption ...
NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
doaj   +1 more source

Home - About - Disclaimer - Privacy