Results 21 to 30 of about 8,080 (254)
A Secure Proxy Re-Signature Scheme for IoT
Vinh Duc Tran
openalex +2 more sources
Controlled Proxy Re-signing - Conditional Proxy Re-Signatures
Delegation of authentication is one of the vital security management strategies to manage device authentication in an enormous network. Major issue while delegating authentication using traditional proxy cryptography is that the delegator loses control over the messages which are authenticated by the delegatee and in proxy recryptography controlling ...
S. Sree Vivek, Guhan Balasubramanian
openalex +2 more sources
Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic ...
Yongli Tang +4 more
doaj +1 more source
Multi-User and Multi-Replica Public Data Audit Scheme Supporting User Revocation [PDF]
Cloudstorage can help save local storage space when dealing with massive data,but increases the risk of data loss or damage.Although the existing audit schemes can verify the integrity of cloud data,it is mainly used in single-user single-replica ...
YANG Xiaodong, PEI Xizhen, CHEN Guilan, WANG Meiding, WANG Caifen
doaj +1 more source
Data Outsourcing and Sharing Scheme Based on Vector Commitment and Proxy Re-encryption [PDF]
In order to guarantee the integrity,confidentiality and accessibility of outsourcing data,a secure data outsourcing and sharing scheme is proposed based on the vector commitment primitive and the proxy re-encryption technology.By introducing a digital ...
WU Xinghua,ZHANG Aixin,LI Jianhua
doaj +1 more source
Sedimentary nitrogen isotope (δ15Nsed) in Santa Barbara Basin (SBB) has been mostly interpreted as the record of the eastern tropical North Pacific (ETNP) intermediate water denitrification process.
Hanyue Xu +11 more
doaj +1 more source
The New Method of Sensor Data Privacy Protection for IoT
This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. The IoT gateway node verifies the integrity and source of the data, then creates a
Yue Wu, Liangtu Song, Lei Liu
doaj +1 more source
The bivalve Glycymeris planicostalis as a high-resolution paleoclimate archive for the Rupelian (Early Oligocene) of central Europe [PDF]
Current global warming is likely to result in a unipolar glaciated world with unpredictable repercussions on atmospheric and oceanic circulation patterns.
E. O. Walliser +5 more
doaj +1 more source
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
Revocable identity-based proxy re-signature scheme in the standard model
User revocation is necessary to the practical application of identity-based proxy re-signature scheme.To solve the problem that the existing identity-based proxy re-signature schemes cannot provide revocation functionality,the notion of revocable ...
Xiaodong YANG +4 more
doaj +2 more sources

