Results 21 to 30 of about 119,685 (321)

CERTIFICATE REVOCATION SCHEME BASED ON WEIGHTED VOTING GAME AND RATIONAL SECURE MULTIPARTY COMPUTING

open access: yesICTACT Journal on Communication Technology, 2017
The Mobile Adhoc Network consists of deployed mobile nodes which lead to the frequent changes in network topology. Due to topology changes, required infrastructure is unavailable for communication.
N Aravinthan, K Geetha
doaj   +1 more source

Self‐assembled Helical Tetramer Stack of Terrylene Bisimide in Solution and Crystalline State

open access: yesAngewandte Chemie, EarlyView.
A TBI with sterically demanding imide substituents self‐assembles in solution into a defined helical tetramer π‐stack. Both the monomer and the tetramer can form complexes with polycyclic aromatic guest molecules, resulting in the formation of tri‐ or hexalayer in solution and in the crystalline solid state.
Simon Soldner   +3 more
wiley   +2 more sources

Total Synthesis of the Spirocyclic Bis‐Indole Alkaloid (−)‐Owerreine via a [4+2] Annulation

open access: yesAngewandte Chemie, EarlyView.
The total synthesis of the bis‐indole alkaloid (−)‐owerreine has been accomplished by a diastereoselective [4+2] annulation between an enamine and an α,β−unsaturated indolenine precursor to form the 3‐spirocyclic tetrahydropyridine linkage of the natural product. DFT calculations allow an understanding of the mechanism of the key annulation.
Elisa Coll   +4 more
wiley   +2 more sources

Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority [PDF]

open access: yesInformatica, 2022
To resolve both certificate management and key escrow problems, a certificateless public-key system (CLPKS) has been proposed. However, a CLPKS setting must provide a revocation mechanism to revoke compromised users. Thus, a revocable certificateless public-key system (RCLPKS) was presented to address the revocation issue and, in such a system, the key
Tseng, Yuh-Min   +4 more
openaire   +1 more source

Ciphertext policy attribute-based encryption scheme supporting direct revocation

open access: yesTongxin xuebao, 2016
In order to support fine-grained attribute revocation in direct revocation mode an attribute-based encryption scheme with efficient revocation was proposed.The model of ABE supporting attribute revocation was given,and a con-crete scheme was constructed ...
Xi-xi YAN, Hui MENG
doaj   +2 more sources

Authorization algorithms for permission-role assignments [PDF]

open access: yes, 2009
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core   +2 more sources

Practical group signature scheme with verifier-local revocation

open access: yesTongxin xuebao, 2011
An efficient approach of member revocation in group signature is verifier-local revocation.In this approach,revocation messages are only sent to signature verifiers,while signers have no involvement.There are some problems in group signature with ...
LI Ji-guo, SUN Gang, ZHANG Yi-chen
doaj   +2 more sources

Authority of Revocation of Mining Business Permits in the Perspective of Administrative Law Towards Good and Environmentally Friendly Mining Governance

open access: yesNurani Hukum, 2022
The President's authority to revoke thousands of mineral and coal Mining Business Permits (IUPs) is part of the efforts of a Good & Environmentally Friendly Mining Governance system.
Wahyu Nugroho   +2 more
doaj   +1 more source

Attribute-based encryption scheme with efficient revocation in data outsourcing systems

open access: yesTongxin xuebao, 2015
In order to support fine-grained attribute revocation in data outsourcing systems,an attribute-based encryption scheme with efficient revocation in indirect revocation model was proposed.The model of ABE supporting attribute revocation was given,and a ...
Xi-xi YAN, Yong-li TANG
doaj   +2 more sources

Blackchain: Scalability for Resource-Constrained Accountable Vehicle-to-X Communication

open access: yes, 2017
In this paper, we propose a new Blockchain-based message and revocation accountability system called Blackchain. Combining a distributed ledger with existing mechanisms for security in V2X communication systems, we design a distributed event data ...
Engelmann, Felix   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy