Results 21 to 30 of about 8,080 (254)

A Secure Proxy Re-Signature Scheme for IoT

open access: bronzeJournal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2023
Vinh Duc Tran
openalex   +2 more sources

Controlled Proxy Re-signing - Conditional Proxy Re-Signatures

open access: goldProceedings of the 12th International Conference on Security and Cryptography, 2015
Delegation of authentication is one of the vital security management strategies to manage device authentication in an enormous network. Major issue while delegating authentication using traditional proxy cryptography is that the delegator loses control over the messages which are authenticated by the delegatee and in proxy recryptography controlling ...
S. Sree Vivek, Guhan Balasubramanian
openalex   +2 more sources

Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme

open access: yesEntropy, 2023
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic ...
Yongli Tang   +4 more
doaj   +1 more source

Multi-User and Multi-Replica Public Data Audit Scheme Supporting User Revocation [PDF]

open access: yesJisuanji gongcheng, 2020
Cloudstorage can help save local storage space when dealing with massive data,but increases the risk of data loss or damage.Although the existing audit schemes can verify the integrity of cloud data,it is mainly used in single-user single-replica ...
YANG Xiaodong, PEI Xizhen, CHEN Guilan, WANG Meiding, WANG Caifen
doaj   +1 more source

Data Outsourcing and Sharing Scheme Based on Vector Commitment and Proxy Re-encryption [PDF]

open access: yesJisuanji gongcheng, 2018
In order to guarantee the integrity,confidentiality and accessibility of outsourcing data,a secure data outsourcing and sharing scheme is proposed based on the vector commitment primitive and the proxy re-encryption technology.By introducing a digital ...
WU Xinghua,ZHANG Aixin,LI Jianhua
doaj   +1 more source

Local and remote forcing on the interannual variations of the sedimentary δ15N in Santa Barbara Basin during the past 80 years

open access: yesFrontiers in Marine Science, 2022
Sedimentary nitrogen isotope (δ15Nsed) in Santa Barbara Basin (SBB) has been mostly interpreted as the record of the eastern tropical North Pacific (ETNP) intermediate water denitrification process.
Hanyue Xu   +11 more
doaj   +1 more source

The New Method of Sensor Data Privacy Protection for IoT

open access: yesShock and Vibration, 2021
This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT gateway node verifies the integrity and source of the data, then creates a
Yue Wu, Liangtu Song, Lei Liu
doaj   +1 more source

The bivalve Glycymeris planicostalis as a high-resolution paleoclimate archive for the Rupelian (Early Oligocene) of central Europe [PDF]

open access: yesClimate of the Past, 2015
Current global warming is likely to result in a unipolar glaciated world with unpredictable repercussions on atmospheric and oceanic circulation patterns.
E. O. Walliser   +5 more
doaj   +1 more source

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Revocable identity-based proxy re-signature scheme in the standard model

open access: yesTongxin xuebao, 2019
User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable ...
Xiaodong YANG   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy