13   Artículos

 
en línea
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao    
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Athanasios Goudosis and Sokratis Katsikas    
The automatic identification system (AIS), despite its importance in worldwide navigation at sea, does not provide any defence mechanisms against deliberate misuse, e.g., by sea pirates, terrorists, business adversaries, or smugglers. Previous work has p... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Qihong Yu, Jiguo Li and Sai Ji    
In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the security of cryptographic systems. Since no existing anonymous broadcast encryption scheme can resist the si... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yi-Fan Tseng, Zi-Yuan Liu and Raylin Tso    
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively. Only if the attribute and predicate vectors satis... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nikos Fotiou and George C. Polyzos    
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that s... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
K.Ruben Raju,Danekula Rajya Lakshmi,Prof.Dr.G.Manoj Someswar    
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Cloud Computing, 1?1. doi:10.1109/tcc.2016.2545668. One of the conditions of submission of a paper for publication is that authors declare explicitly that thei... ver más

 
usuarios registrados
Boneh, D. Franklin, M.     Pág. 586 - 615
Revista: SIAM JOURNAL ON COMPUTING    Formato: Impreso

« Anterior     Página: 1 de 1     Siguiente »