53   Artículos

 
en línea
Meijuan Huang, Yutian Liu, Bo Yang, Yanqi Zhao and Mingrui Zhang    
Revocable attribute-based encryption (RABE) provides greater flexibility and fine-grained access control for data sharing. However, the revocation process for most RABE schemes today is performed by the cloud storage provider (CSP). Since the CSP is an h... ver más
Revista: Information    Formato: Electrónico

 
en línea
Huifeng Fan, Ruwei Huang and Fengting Luo    
Aiming at the problem that the fully homomorphic encryption scheme based on single identity cannot satisfy the homomorphic operation of ciphertext under different identities, as well as the inefficiency of trapdoor function and the complexity of sampling... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Maki Kihara and Satoshi Iriyama    
A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain cryp... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yang Yang and Guanghua Song    
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan and Mohammed Al-Khalidi    
In today?s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time c... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu    
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yongbo Jiang, Juncheng Lu and Tao Feng    
Searchable encryption is a keyword-based ciphertext retrieval scheme, which can selectively retrieve encrypted documents on encrypted cloud data. Most existing searchable encryption schemes focus only on exact keyword searches and cannot return data of i... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zhu Fang and Zhengquan Xu    
Advances in network technology have enhanced the concern for network security issues. In order to address the problem that hopping graph are vulnerable to external attacks (e.g., the changing rules of fixed graphs are more easily grasped by attackers) an... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nursulu Kapalova, Kairat Sakan, Kunbolat Algazy and Dilmukhanbet Dyusenbayev    
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides five-round encryption of 128-bit blocks, while the data size at the input and output of the S-box is 8 bits. The main transformation is the F transformat... ver más
Revista: Computation    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »