Results 41 to 50 of about 119,685 (321)

An Identity-Based Group Signature with Membership Revocation in the Standard Model [PDF]

open access: yes, 2010
Group signatures allow group members to sign an arbitrary number\ud of messages on behalf of the group without revealing their\ud identity. Under certain circumstances the group manager holding a\ud tracing key can reveal the identity of the signer from ...
Hartel, Pieter   +3 more
core   +3 more sources

Lattice-based Group Signature Scheme with Verifier-local Revocation [PDF]

open access: yes, 2014
International audienceSupport of membership revocation is a desirable functionality for any group signature scheme. Among the known revocation approaches, verifier-local revocation (VLR) seems to be the most flexible one, because it only requires the ...
A. Fiat   +32 more
core   +4 more sources

CONSIDERATIONS CONCERNING THE REVOCATION OF ADMINISTRATIVE ACTS WHICH ARE CONTRARY TO EUROPEAN UNION LAW [PDF]

open access: yesChallenges of the Knowledge Society, 2012
In the process of adopting administrative acts, public authorities are obliged to respect both the national provisions legally superior and European Union law with superior legal force and also the general principles of law, including those imposed by ...
CONSTANTA MATUSESCU
doaj  

Efficient Revocable ID-Based Signature With Cloud Revocation Server

open access: yesIEEE Access, 2017
Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management.
Xiaoying Jia   +3 more
doaj   +1 more source

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

Ciphertext Outdate Attacks on the Revocable Attribute-Based Encryption Scheme With Time Encodings

open access: yesIEEE Access, 2019
Cloud storage is a new computing paradigm that allows users to store their data in the cloud and access them anytime anywhere through the Internet. To address the various security issues that may arise in the cloud storage accessed by a large number of ...
Kwangsu Lee
doaj   +1 more source

An Anonymous Authentication With Received Signal Strength Based Pseudonymous Identities Generation for VANETs

open access: yesIEEE Access, 2023
Anonymous authentication system enables mobile users to anonymously authenticate themselves to an authorized entity such as a Group Manager (GM) without revealing any privacy information.
Amang Sudarsono, Mike Yuliana
doaj   +1 more source

Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation

open access: yes, 2018
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a ...
Ling, San   +3 more
core   +1 more source

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

open access: yesIET Networks, EarlyView., 2023
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley   +1 more source

Suspended Sentences and Free-Standing Probation Orders in U.S. Guidelines Systems: A Survey and Assessment [PDF]

open access: yes, 2010
Much academic attention has been directed towards management models, but there is limited research into the details of how these models are put to use in organizations.
Elg, Mattias, Langstrand, Jostein
core   +3 more sources

Home - About - Disclaimer - Privacy