Results 41 to 50 of about 10,953 (251)

Proxy re-encryption schemes for IoT and crowd sensing [PDF]

open access: yes, 2016
IoT, crowd sensing and smart cities will be a traffic challenge. New communication paradigms as asynchronous messaging carry and forward, scheduled delivery and temporary storage will be needed to manage network resources dynamically.
Almenares, Florina   +4 more
core   +1 more source

Secure Cloud Storage: A Framework for Data Protection as a Service in the Multi-cloud Environment [PDF]

open access: yes, 2015
This paper introduces Secure Cloud Storage (SCS), a framework for Data Protection as a Service (DPaaS) to cloud computing users. Compared to the existing Data Encryption as a Service (DEaaS) such as those provided by Amazon and Google, DPaaS provides ...
Asal, Rasool   +5 more
core   +2 more sources

Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption [PDF]

open access: yesIEEE Transactions on Information Theory, 2008
In 1998, Blaze, Bleumer and Strauss introduced a cryptographic primitive called proxy re-encryption in which a proxy can transform-without seeing the plaintext-a ciphertext encrypted under one key into an encryption of the same plaintext under another key. The concept has recently drawn renewed interest.
Libert, Benoit, Vergnaud, Damien
openaire   +2 more sources

A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing

open access: yesIEEE Access, 2021
With rapidly increasing adoption of cloud computing and the advancement of today mobile computing, it is inevitable that mobile devices are used to receive and send the data through the mobile cloud platform.
Somchart Fugkeaw
doaj   +1 more source

Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]

open access: yes, 2014
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa   +4 more
core   +3 more sources

Mapping the evolution of mitochondrial complex I through structural variation

open access: yesFEBS Letters, EarlyView.
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin   +2 more
wiley   +1 more source

Attribute-based proxy re-encryption scheme with multiple features

open access: yesTongxin xuebao, 2019
A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to ...
Chaosheng FENG   +4 more
doaj   +2 more sources

Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices

open access: yesMathematics, 2023
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic.
Er-Shuo Zhuang, Chun-I Fan
doaj   +1 more source

Universal Re-encryption for Mixnets [PDF]

open access: yes, 2004
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a player with knowledge of the public key corresponding to a given ciphertext. In contrast, universal re-encryption can be done without knowledge of public keys.
Philippe Golle   +3 more
openaire   +1 more source

End-to-end security for video distribution [PDF]

open access: yes, 2013
Content distribution applications such as digital broadcasting, video-on-demand services, video conferencing, surveillance, and telesurgery are confronted with difficultiesbesides the inevitable compression and quality challengeswith respect to ...
Boho, Andras   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy