CERTIFICATE REVOCATION SCHEME BASED ON WEIGHTED VOTING GAME AND RATIONAL SECURE MULTIPARTY COMPUTING
The Mobile Adhoc Network consists of deployed mobile nodes which lead to the frequent changes in network topology. Due to topology changes, required infrastructure is unavailable for communication.
N Aravinthan, K Geetha
doaj +1 more source
Self‐assembled Helical Tetramer Stack of Terrylene Bisimide in Solution and Crystalline State
A TBI with sterically demanding imide substituents self‐assembles in solution into a defined helical tetramer π‐stack. Both the monomer and the tetramer can form complexes with polycyclic aromatic guest molecules, resulting in the formation of tri‐ or hexalayer in solution and in the crystalline solid state.
Simon Soldner +3 more
wiley +2 more sources
Total Synthesis of the Spirocyclic Bis‐Indole Alkaloid (−)‐Owerreine via a [4+2] Annulation
The total synthesis of the bis‐indole alkaloid (−)‐owerreine has been accomplished by a diastereoselective [4+2] annulation between an enamine and an α,β−unsaturated indolenine precursor to form the 3‐spirocyclic tetrahydropyridine linkage of the natural product. DFT calculations allow an understanding of the mechanism of the key annulation.
Elisa Coll +4 more
wiley +2 more sources
Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority [PDF]
To resolve both certificate management and key escrow problems, a certificateless public-key system (CLPKS) has been proposed. However, a CLPKS setting must provide a revocation mechanism to revoke compromised users. Thus, a revocable certificateless public-key system (RCLPKS) was presented to address the revocation issue and, in such a system, the key
Tseng, Yuh-Min +4 more
openaire +1 more source
Ciphertext policy attribute-based encryption scheme supporting direct revocation
In order to support fine-grained attribute revocation in direct revocation mode an attribute-based encryption scheme with efficient revocation was proposed.The model of ABE supporting attribute revocation was given,and a con-crete scheme was constructed ...
Xi-xi YAN, Hui MENG
doaj +2 more sources
Authorization algorithms for permission-role assignments [PDF]
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core +2 more sources
Practical group signature scheme with verifier-local revocation
An efficient approach of member revocation in group signature is verifier-local revocation.In this approach,revocation messages are only sent to signature verifiers,while signers have no involvement.There are some problems in group signature with ...
LI Ji-guo, SUN Gang, ZHANG Yi-chen
doaj +2 more sources
The President's authority to revoke thousands of mineral and coal Mining Business Permits (IUPs) is part of the efforts of a Good & Environmentally Friendly Mining Governance system.
Wahyu Nugroho +2 more
doaj +1 more source
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
In order to support fine-grained attribute revocation in data outsourcing systems,an attribute-based encryption scheme with efficient revocation in indirect revocation model was proposed.The model of ABE supporting attribute revocation was given,and a ...
Xi-xi YAN, Yong-li TANG
doaj +2 more sources
Blackchain: Scalability for Resource-Constrained Accountable Vehicle-to-X Communication
In this paper, we propose a new Blockchain-based message and revocation accountability system called Blackchain. Combining a distributed ledger with existing mechanisms for security in V2X communication systems, we design a distributed event data ...
Engelmann, Felix +4 more
core +1 more source

