Zobrazeno 1 - 10
of 9 690
pro vyhledávání: '"Ciphertext"'
Publikováno v:
Tongxin xuebao, Vol 45, Pp 20-36 (2024)
To solve the problems of low security and high resource overhead of existing hidden policy ciphertext policy attribute-based encryption (CP-ABE) schemes, a partially hidden policy multi-authority CP-ABE scheme with constant length ciphertext was prop
Externí odkaz:
https://doaj.org/article/d8aeb4360bfc41c99be6df3dee5077f1
Publikováno v:
Alifmatika, Vol 6, Iss 1, Pp 90-103 (2024)
Research on developing an anti-hacker network security system for the learning management system was conducted at SMP Plus Darus Salam. Learning activities at SMP Plus Darus Salam use LMS as a media, which is a program to maximize learning activities
Externí odkaz:
https://doaj.org/article/5e334cb18d4e455cb6f0f5048dc8d3f8
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
Profiling side-channel analysis, recognized for its robust attack performance in worst-case scenarios, necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling. On the other hand, nonprofili
Externí odkaz:
https://doaj.org/article/83347d8d22a848b7bc5140d729e7053f
Autor:
Volodymyr Korchynskyi, Valerii Hordiichuk, Vitalii Kildishev, Oleksandr Riabukha, Sergii Staikutsa, Khaled Alfaiomi
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 0, Iss 4, Pp 184-195 (2023)
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data. The goal is to develop a multi-stage method for prot
Externí odkaz:
https://doaj.org/article/a653d68ef7d24b67921badaf9e411ad3
An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things
Publikováno v:
Sensors, Vol 24, Iss 21, p 6843 (2024)
The Internet of Things (IoT) is a heterogeneous network composed of numerous dynamically connected devices. While it brings convenience, the IoT also faces serious challenges in data security. Ciphertext-policy attribute-based encryption (CP-ABE) is
Externí odkaz:
https://doaj.org/article/4ac5f464d27d44c694ffc425141ee900
Publikováno v:
ISPRS International Journal of Geo-Information, Vol 13, Iss 9, p 321 (2024)
Satellite service systems transfer data from satellite providers to the big data industry, which includes data traders and data analytics companies. This system needs to provide access to numerous users whose specific identities are unknown. Cipherte
Externí odkaz:
https://doaj.org/article/083a2a9e167b454185dc41d75f9c23cb
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
In an effort to circumvent the high cost of standard countermeasures against side-channel attacks in post-quantum cryptography, some works have developed low-cost detection-based countermeasures. These countermeasures try to detect maliciously genera
Externí odkaz:
https://doaj.org/article/071439e967aa4c0b8a193bfb85a899e7
Publikováno v:
Mathematical Biosciences and Engineering, Vol 20, Iss 11, Pp 20295-20316 (2023)
Energy utilization rates have been largely improved thanks to the wide application of smart grids, thereby realizing the reliable, economic and efficient operation of the grids. However, such an application is also accompanied by many security issues
Externí odkaz:
https://doaj.org/article/50bc917d7d5f4cc9beaf4544a78b26c4
Publikováno v:
Sistemnì Doslìdženâ ta Informacìjnì Tehnologìï, Iss 3, Pp 19-41 (2023)
Technology for Cloud Computing (CC) has advanced, so Cloud Computing creates a variety of cloud services. Users may receive storage space from the provider as Cloud storage services are quite practical; many users and businesses save their data in cl
Externí odkaz:
https://doaj.org/article/410a51b1356441258b64159f44e8a57f
Publikováno v:
Applied Mathematics and Nonlinear Sciences, Vol 9, Iss 1 (2024)
This paper constructs a secure storage and sharing model of medical data based on the blockchain technology of computer network technology, and the model mainly designs the encryption process, storage process and sharing process of medical data. The
Externí odkaz:
https://doaj.org/article/069e8d9046554076beb5962c07e67af9