Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Ibraimi, L."'
Autor:
Ibraimi, L., Petkovic, M., Nikova, S.I., Hartel, Pieter H., Jonker, Willem, Youm, Heung Youl, Yung, Moti
Publikováno v:
Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers, 309-323
STARTPAGE=309;ENDPAGE=323;TITLE=Information Security Applications
Information Security Applications (10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers ), 309-323
STARTPAGE=309;ENDPAGE=323;TITLE=Information Security Applications (10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers )
Information Security Applications ISBN: 9783642108372
WISA
STARTPAGE=309;ENDPAGE=323;TITLE=Information Security Applications
Information Security Applications (10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers ), 309-323
STARTPAGE=309;ENDPAGE=323;TITLE=Information Security Applications (10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers )
Information Security Applications ISBN: 9783642108372
WISA
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attributes. The user can decrypt the ciphertext if and only if the attribu
Publikováno v:
User-Driven Healthcare: Concepts, Methodologies, Tools, and Applications, 1141-1166
STARTPAGE=1141;ENDPAGE=1166;TITLE=User-Driven Healthcare
E-health, assistive technologies and applications for assisted living : challenges and solutions, 23-48
STARTPAGE=23;ENDPAGE=48;TITLE=E-health, assistive technologies and applications for assisted living : challenges and solutions
STARTPAGE=1141;ENDPAGE=1166;TITLE=User-Driven Healthcare
E-health, assistive technologies and applications for assisted living : challenges and solutions, 23-48
STARTPAGE=23;ENDPAGE=48;TITLE=E-health, assistive technologies and applications for assisted living : challenges and solutions
The introduction of e-Health and extramural applications in the personal healthcare domain has raised serious concerns about security and privacy of health data. Novel digital technologies require other security approaches in addition to the traditio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::667b729562fbd215ab55c0a7b84b617e
https://research.tue.nl/en/publications/eca9e48f-c664-4aaf-a533-3fc2f88acb55
https://research.tue.nl/en/publications/eca9e48f-c664-4aaf-a533-3fc2f88acb55
An attribute-based digital signature system comprises a signature generation unit (1) for signing a message (m) by generating a signature (s) based on a user secret key (SK) associated with a set of user attributes, wherein the signature generation u
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::0dde341602cdb2f3819b4d4d9d005189
https://research.utwente.nl/en/publications/attributebased-digital-signature-system(81f193a1-a720-4f80-8b69-fe4f2e508aa9).html
https://research.utwente.nl/en/publications/attributebased-digital-signature-system(81f193a1-a720-4f80-8b69-fe4f2e508aa9).html
Publikováno v:
Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS), 532-549
STARTPAGE=532;ENDPAGE=549;TITLE=Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS)
Applied Cryptography and Network Security ISBN: 9783642215537
ACNS
STARTPAGE=532;ENDPAGE=549;TITLE=Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS)
Applied Cryptography and Network Security ISBN: 9783642215537
ACNS
In a public key setting, Alice encrypts an email with the public key of Bob, so that only Bob will be able to learn the contents of the email. Consider a scenario where the computer of Alice is infected and unbeknown to Alice it also embeds a malware
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fcd918024ec816ad364cf7d738806c77
https://research.utwente.nl/en/publications/f9fbcf7b-3683-4f71-a0a5-dc20dc55741b
https://research.utwente.nl/en/publications/f9fbcf7b-3683-4f71-a0a5-dc20dc55741b
Publikováno v:
Communications and Multimedia Security (12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings), 244-246
STARTPAGE=244;ENDPAGE=246;TITLE=Communications and Multimedia Security (12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings)
Communications and Multimedia Security ISBN: 9783642247118
Communications and Multimedia Security
Proceedings of the 12th IFIP TC 6 / TC 11 International Conference on Communications and Multimedia Security (CMS 2011), 244-246
STARTPAGE=244;ENDPAGE=246;TITLE=Proceedings of the 12th IFIP TC 6 / TC 11 International Conference on Communications and Multimedia Security (CMS 2011)
STARTPAGE=244;ENDPAGE=246;TITLE=Communications and Multimedia Security (12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings)
Communications and Multimedia Security ISBN: 9783642247118
Communications and Multimedia Security
Proceedings of the 12th IFIP TC 6 / TC 11 International Conference on Communications and Multimedia Security (CMS 2011), 244-246
STARTPAGE=244;ENDPAGE=246;TITLE=Proceedings of the 12th IFIP TC 6 / TC 11 International Conference on Communications and Multimedia Security (CMS 2011)
In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of attributes, and a list of the identities o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::744d3f17c8b2483a9962456d334922ff
https://doi.org/10.1007/978-3-642-24712-5_25
https://doi.org/10.1007/978-3-642-24712-5_25
A ciphertext-policy attribute-based encryption system, comprising a re-encrypter (9) for cryptographically transforming a first ciphertext (CTp1) associated with a first access policy (P1) into a second ciphertext (CTP2) associated with a second acce
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::d264e6429b599943467a813f4ad3b555
https://research.utwente.nl/en/publications/ciphertextpolicy-attributebased-encryption-and-reencryption(4d968827-24f0-4118-9bc7-54f5bde3185a).html
https://research.utwente.nl/en/publications/ciphertextpolicy-attributebased-encryption-and-reencryption(4d968827-24f0-4118-9bc7-54f5bde3185a).html
Publikováno v:
SECRYPT 2010, International Conference on Security and Cryptography, 399-408
STARTPAGE=399;ENDPAGE=408;TITLE=SECRYPT 2010, International Conference on Security and Cryptography
SECRYPT 2010 (Proceedings of the 5th International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010), 399-408
STARTPAGE=399;ENDPAGE=408;TITLE=SECRYPT 2010 (Proceedings of the 5th International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010)
e-Business and Telecommunications (7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers), 304-318
STARTPAGE=304;ENDPAGE=318;TITLE=e-Business and Telecommunications (7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers)
Communications in Computer and Information Science ISBN: 9783642252051
SECRYPT
STARTPAGE=399;ENDPAGE=408;TITLE=SECRYPT 2010, International Conference on Security and Cryptography
SECRYPT 2010 (Proceedings of the 5th International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010), 399-408
STARTPAGE=399;ENDPAGE=408;TITLE=SECRYPT 2010 (Proceedings of the 5th International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010)
e-Business and Telecommunications (7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers), 304-318
STARTPAGE=304;ENDPAGE=318;TITLE=e-Business and Telecommunications (7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers)
Communications in Computer and Information Science ISBN: 9783642252051
SECRYPT
Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attributes which satisfy the access policy can dec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2b06ae96d31a3bdb7e8ddc5cb14419a7
https://research.utwente.nl/en/publications/0d90558f-da2c-4e11-99c9-fce73172d6c7
https://research.utwente.nl/en/publications/0d90558f-da2c-4e11-99c9-fce73172d6c7
Group signatures allow group members to sign an arbitrary number of messages on behalf of the group without revealing their identity. Under certain circumstances the group manager holding a tracing key can reveal the identity of the signer from the s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::4813596da7461c48fd824b5efb9f51c3
https://research.utwente.nl/en/publications/an-identitybased-group-signature-with-membership-revocation-in-the-standard-model(6703c61f-8fc3-4828-b46d-e875925c7569).html
https://research.utwente.nl/en/publications/an-identitybased-group-signature-with-membership-revocation-in-the-standard-model(6703c61f-8fc3-4828-b46d-e875925c7569).html
Publikováno v:
International journal of computational models and algorithms in medicine, 1(2), 1-21. IGI Global
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an inappropriate disclosure may cause serious problems to an individual.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::040d943b4fa68c358fddc87ce168d195
https://research.utwente.nl/en/publications/exploring-typeandidentitybased-proxy-reencryption-scheme-to-securely-manage-personal-health-records(c4bcf4d7-7b3e-4fd2-8cee-f351c1d3b650).html
https://research.utwente.nl/en/publications/exploring-typeandidentitybased-proxy-reencryption-scheme-to-securely-manage-personal-health-records(c4bcf4d7-7b3e-4fd2-8cee-f351c1d3b650).html
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attributes. The user can decrypt the ciphertext if and only if the attribu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::1663768716c9d2e7c90394480d7c5b11
https://research.utwente.nl/en/publications/mediated-ciphertextpolicy-attributebased-encryption-and-its-application-extended-version(3ed0ad33-e4ba-43a6-a825-3eb3bbc078d0).html
https://research.utwente.nl/en/publications/mediated-ciphertextpolicy-attributebased-encryption-and-its-application-extended-version(3ed0ad33-e4ba-43a6-a825-3eb3bbc078d0).html