Results 61 to 70 of about 1,315,010 (177)
Vote by ballot is the feature in a democratic society and the process of decision-making, tending to achieve the philosophy of democratic politics by having the public who are eligible to vote for competent candidates or leaders.
Tsung-Chih Hsiao +3 more
doaj +1 more source
Still Wrong Use of Pairings in Cryptography [PDF]
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core +1 more source
Secure Multiple Group Data Deduplication in Cloud Data Storage [PDF]
埼玉大学博士(学術)xvii, 112 p.With the tremendous growth of available digital data, the use of Cloud Service Providers are gaining much popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking ...
29503, EI, MON CHO, イ, モン チョ
core +1 more source
We introduce Vetted Encryption (VE), a novel cryptographic primitive, which addresses the following scenario: a receiver controls, or vets, who can send them encrypted messages.
AW Dent +9 more
core +1 more source
Xml-Based Privacy Model in Pervasive Computing [PDF]
The years coming promise to bring new area of information technology, transferring it from scientists minds into reality, on one hand a new paradigm known as pervasive calm, ubiquitous computing, or pervasive computing has the ability to overcome a lot
Dehghantanha, Ali
core
nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness [PDF]
Based on the ring signature technology, the multi-receiver ID-based anonymous signcryption (MIBAS) is proposed, and its goal is to protect the privacy of the sender or so-called signer.
Li, Huixian, Pang, Liaojun
core +1 more source
Anonymous ID Based Signcryption Scheme for Multiple Receivers [PDF]
Anonymous signcryption is synonyms of ring signcryption which provides anonymity of the sender along with the advantages of signcryption. Multi receiver signcryption is suited for situation where a sender wants to send a message to multiple receivers in ...
Prashant Kushwah, Sunder Lal
core
Clustering-based fragmentation and data replication for flexible query answering in distributed databases [PDF]
One feature of cloud storage systems is data fragmentation (or sharding) so that data can be distributed over multiple servers and subqueries can be run in parallel on the fragments.
Lena Wiese
core +1 more source
The aim of this paper is to provide an overview for the research that has been done so far in signcryption area. The paper also presents the extensions for the signcryption scheme and discusses the security in signcryption.
Laura Savu
core
A Study on the Secure Online Examination System [PDF]
13301甲第4475号博士(工学)金沢大学博士論文本文Full 以下に掲載:IJCANDI (International Journal of Computing and Informatics) 1(3) pp.90-100 2016. Universitas Mulawarman & Universiti Malaysia Sabah.
Wahid, Yunus Abdul +1 more
core +3 more sources

