Results 31 to 40 of about 40,010 (281)

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups

open access: yes, 2010
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direc- tion, this paper presents a novel approach to share a secret among a hierarchy of users while overcoming the ...
Naskar, Ruchira, Sengupta, Indranil
core   +3 more sources

My Holistic Data Share: A WEB3 Data Share Application: Extending Beyond Finance to Privacy-Protected Decentralized Share of Multi-Dimensional Data to Enhance Global Healthcare

open access: yesBlockchain in Healthcare Today
WEB3.0 technologies on network architectures, distributed ledgers, and decentralized artificial intelligence represents a transformative shift in how data are handled, stored and shared.
SATHYA KRISHNASAMY
doaj   +1 more source

Rational-security and fair two-party comparison protocol

open access: yesTongxin xuebao, 2023
Existing secure two-party comparison protocols usually allowed one party (e.g., Alice) to obtain a comparison result first, and then Alice informed the other one (e.g., Bob) of the comparison result.Obviously, if Alice refused or failed to send the ...
Bowen ZHAO   +5 more
doaj  

Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories

open access: yes, 2015
We introduce the concept of cryptographic reduction, in analogy with a similar concept in computational complexity theory. In this framework, class $A$ of crypto-protocols reduces to protocol class $B$ in a scenario $X$, if for every instance $a$ of $A$,
Aravinda, S.   +3 more
core   +1 more source

Gut microbiome and aging—A dynamic interplay of microbes, metabolites, and the immune system

open access: yesFEBS Letters, EarlyView.
Age‐dependent shifts in microbial communities engender shifts in microbial metabolite profiles. These in turn drive shifts in barrier surface permeability of the gut and brain and induce immune activation. When paired with preexisting age‐related chronic inflammation this increases the risk of neuroinflammation and neurodegenerative diseases.
Aaron Mehl, Eran Blacher
wiley   +1 more source

Valosin‐containing protein counteracts ATP‐driven dissolution of FUS condensates through its ATPase activity in vitro

open access: yesFEBS Letters, EarlyView.
Biomolecular condensates formed by fused in sarcoma (FUS) are dissolved by high ATP concentrations yet persist in cells. Using a reconstituted system, we demonstrate that valosin‐containing protein (VCP), an AAA+ ATPase, counteracts ATP‐driven dissolution of FUS condensates through its D2 ATPase activity.
Hitomi Kimura   +2 more
wiley   +1 more source

Obfuscating encrypted threshold signature algorithm and its applications in cloud computing.

open access: yesPLoS ONE, 2021
Current cloud computing causes serious restrictions to safeguarding users' data privacy. Since users' sensitive data is submitted in unencrypted forms to remote machines possessed and operated by untrusted service providers, users' sensitive data may be ...
Yahong Li   +6 more
doaj   +1 more source

Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings

open access: yesIEEE Access, 2021
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties.
Xiwei Shan, Lin You, Gengran Hu
doaj   +1 more source

Data Confidentiality in Mobile Ad hoc Networks [PDF]

open access: yes, 2012
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.
Al-Bayatti, Ali   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy