Showing 385–396 of 2066 results

  • Placeholder

    Attribute Based Encryption with dynamic membership

    0 out of 5
    4,500

    Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing Abstract?Techniques to Minimize State Transfer Costs for Dynamic Execution Of?oading in Mobile Cloud Computing. Attribute-based encryption (ABE) is an advanced encryption technology where the privacy of receivers is protected by a set of attributes. An encryptor can ensure that only the…

  • Attribute Based Secure Mailing In College Campus

    0 out of 5
    3,500

    Attribute Based Secure Mailing In College Campus Abstract?Attribute Based Secure Mailing In College Campus. Stress and Anxiety negatively affect mental health and can lead a number of debilitating impacts to overall health and well being. In the recent past, adolescents are becoming increasingly afflicted with Stress and Anxiety. In this paper, we report our findings…

  • Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing

    0 out of 5
    4,500

    Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing Abstract? With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data…

  • Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing

    0 out of 5
    4,500

    Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing Abstract? With the popularity of cloud computing, there have been increasing concerns about its security and privacy. Since the cloud computing environment is distributed and untrusted, data owners have to encrypt outsourced data to enforce confidentiality. Therefore, how to achieve practicable access control of encrypted data…

  • Placeholder

    Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks

    0 out of 5
    4,500

    Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks Abstract? a novel Multi-message Ciphertext Policy Attribute-Based Encryption (MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for sharing scalable media based on data consumers’ attributes (e.g., age, nationality, or gender) rather than an explicit list of the consumers’ names. < Final...

  • Attribute-Based Encryption With Verifiable Outsourced Decryption

    0 out of 5
    4,500

    Attribute-Based Encryption With Verifiable Outsourced Decryption Abstract? Attribute-Based Encryption With Verifiable Outsourced Decryption. Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes…

  • Audit-Free Cloud Storage via Deniable Attribute-based Encryption

    0 out of 5
    4,500

    Audit-Free Cloud Storage via Deniable Attribute-based Encryption Abstract? Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. All such schemes assumed that cloud storage providers are safe and cannot be hacked; however, in…

  • Authenticated Key Exchange Protocols for Parallel Network File Systems

    0 out of 5
    4,500

    Authenticated Key Exchange Protocols for Parallel Network File Systems Abstract? Authenticated Key Exchange Protocols for Parallel Network File Systems. We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed ?le systems supporting parallel access to multiple storage devices. Our work focuses on the current…

  • Placeholder

    Authenticated Subgraph Similarity Search in Outsourced Graph Databases

    0 out of 5
    4,500

    Authenticated Subgraph Similarity Search in Outsourced Graph Databases Abstract?Subgraph similarity search is used in graph databases to retrieve graphs whose subgraphs are similar to a given query graph. It has been proven successful in a wide range of applications including bioinformatics and chem-informatics, etc. Due to the cost of providing efficient similarity search services on…

  • Placeholder

    Authentication Using Captcha As Graphical Password

    0 out of 5
    4,500

    Authentication Using Captcha As Graphical Password Abstract?Authentication Using Captcha As Graphical Password. Many security primitives are based on hard mathematical problems. Using hard AI problems for security is emerging as an exciting new paradigm, but has been under-explored. In this paper, we present a new security primitive based on hard AI problems, namely, a novel…

  • Authentication for Session Password Using Color and Images

    0 out of 5
    4,500

    Authentication for Session Password Using Color and Images Abstract? Authentication for Session Password Using Color and Images. Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources until the…

  • Authorized Data Transfer using Key Classification

    0 out of 5
    3,500

    Authorized Data Transfer using Key Classification Abstract?Authorized Data Transfer using Key Classification. The goal of interaction between human and computer is to find a way to treat it like human-human interaction. Gestures play an important role in human’s daily life in order to transfer data and human emotions. The gestures are results of part of…

End of content

End of content