Results 61 to 70 of about 1,315,010 (177)

Electronic voting systems for defending free will and resisting bribery and coercion based on ring anonymous signcryption scheme

open access: yesAdvances in Mechanical Engineering, 2017
Vote by ballot is the feature in a democratic society and the process of decision-making, tending to achieve the philosophy of democratic politics by having the public who are eligible to vote for competent candidates or leaders.
Tsung-Chih Hsiao   +3 more
doaj   +1 more source

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

Secure Multiple Group Data Deduplication in Cloud Data Storage [PDF]

open access: yes, 2018
埼玉大学博士(学術)xvii, 112 p.With the tremendous growth of available digital data, the use of Cloud Service Providers are gaining much popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking ...
29503, EI, MON CHO, イ, モン チョ
core   +1 more source

Vetted Encryption [PDF]

open access: yes, 2020
We introduce Vetted Encryption (VE), a novel cryptographic primitive, which addresses the following scenario: a receiver controls, or vets, who can send them encrypted messages.
AW Dent   +9 more
core   +1 more source

Xml-Based Privacy Model in Pervasive Computing [PDF]

open access: yes, 2008
The years coming promise to bring new area of information technology, transferring it from scientists minds into reality, on one hand a new paradigm known as pervasive calm, ubiquitous computing, or pervasive computing has the ability to overcome a lot
Dehghantanha, Ali
core  

nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness [PDF]

open access: yes, 2013
Based on the ring signature technology, the multi-receiver ID-based anonymous signcryption (MIBAS) is proposed, and its goal is to protect the privacy of the sender or so-called signer.
Li, Huixian, Pang, Liaojun
core   +1 more source

Anonymous ID Based Signcryption Scheme for Multiple Receivers [PDF]

open access: yes, 2009
Anonymous signcryption is synonyms of ring signcryption which provides anonymity of the sender along with the advantages of signcryption. Multi receiver signcryption is suited for situation where a sender wants to send a message to multiple receivers in ...
Prashant Kushwah, Sunder Lal
core  

Clustering-based fragmentation and data replication for flexible query answering in distributed databases [PDF]

open access: yes, 2014
One feature of cloud storage systems is data fragmentation (or sharding) so that data can be distributed over multiple servers and subqueries can be run in parallel on the fragments.
Lena Wiese
core   +1 more source

SIGNCRYPTION ANALYZE [PDF]

open access: yes
The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption.
Laura Savu
core  

A Study on the Secure Online Examination System [PDF]

open access: yes, 2016
13301甲第4475号博士(工学)金沢大学博士論文本文Full 以下に掲載:IJCANDI (International Journal of Computing and Informatics) 1(3) pp.90-100 2016. Universitas Mulawarman & Universiti Malaysia Sabah.
Wahid, Yunus Abdul   +1 more
core   +3 more sources

Home - About - Disclaimer - Privacy