Results 1 to 10 of about 119,685 (321)

Revocable and Traceable Decentralized ABE for P2P Networks [PDF]

open access: yesEntropy
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology provides fine-grained access control capabilities for P2P networks. However, its long-term development has been constrained by three major challenges: the trade-off between computational ...
Dan Gao, Huanhuan Xu, Shuqu Qian
doaj   +2 more sources

Legal and Jurisprudential Analysis of the views of the Guardian Council and the procedure of the Administrative Justice Court about Extending the Effect of Revocation to the Time of ratification [PDF]

open access: yesمطالعات فقه و حقوق اسلامی, 2021
Although recognizing the jurisdiction of the revocation of regulation contrary to the law or the Sharia in article 170 for the Administrative Justice court, the effect of the revocation has some ambiguities.
Mohamad Amin Abrishami rad
doaj   +1 more source

The Study of Legality of Intentional Revocation of Unilateral Acts of States in International Law [PDF]

open access: yesFaṣlnāmah-i Pizhūhish-i Huqūq-i ̒Umūmī, 2021
The One of the main issues in the legal regimes is the intentional revocation of any kind of obligations. This revocation means that obligant party terminates its duty merely at the request of that party.
Siamak Karimi
doaj   +1 more source

Certificate Revocation Schemes in Vehicular Networks: A Survey

open access: yesIEEE Access, 2020
The problem of security in vehicular networks is a vital issue and attracts researchers' increasing attention for its unique characteristics, such as the vulnerability of wireless media, untrusted communication environment, and closely relationship with ...
Qianpeng Wang, Deyun Gao, Du Chen
doaj   +1 more source

The nature of Revocation and it's distinction from similar concepts [PDF]

open access: yesمطالعات فقه و حقوق اسلامی, 2016
Revocation is one of the important legal institutions that beside institutions like right of option, and right to rescind allow people that by means of that cancel their previous actions and revoke of them.
حامد خسروی   +2 more
doaj   +1 more source

Indirect Revocable KP-ABE With Revocation Undoing Resistance

open access: yesIEEE Transactions on Services Computing, 2022
Lately, many cloud-based applications proposed Attribute-Based Encryption (ABE) as an all-in-one solution for achieving confidentiality and access control. Within this paradigm, data producers store the encrypted data on a semi-trusted cloud server, and users, holding decryption keys issued by a key authority, can decrypt data according to some access ...
Rasori, Marco   +3 more
openaire   +2 more sources

An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem

open access: yesIEEE Access, 2023
Supporting users to transact with websites securely in a privacy-preserving manner has become more challenging than ever in the web ecosystem based on public key infrastructures.
Diana Gratiela Berbecaru, Antonio Lioy
doaj   +1 more source

Server-aided immediate and robust user revocation mechanism for SM9

open access: yesCybersecurity, 2020
As the only approved Identity-Based Encryption scheme in China that is also standardized by ISO, SM9-IBE has been widely adopted in many real-world applications.
Shuzhou Sun   +3 more
doaj   +1 more source

Revocable Signature Scheme with Implicit and Explicit Certificates

open access: yesEntropy, 2023
This paper addresses the certificate revocation problem and proposes the first revocable pairing-based signature scheme with implicit and explicit certificates (IE-RCBS-kCAA).
Jerzy Pejaś   +2 more
doaj   +1 more source

Backward Compatible Identity-Based Encryption

open access: yesSensors, 2023
In this paper, we present a new identity-based encryption (IBE) system that is named Backward Compatible Identity-based Encryption (BC-IBE). Our BC-IBE is proposed to solve the problem caused by the out-of-synchronization between users’ private keys and ...
Jongkil Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy