Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Jason Paul Cruz"'
Publikováno v:
Blockchain: Research and Applications, Vol 3, Iss 4, Pp 100101- (2022)
Ethereum smart contracts are computer programs that are deployed and executed on the Ethereum blockchain to enforce agreements among untrusting parties. Being the most prominent platform that supports smart contracts, Ethereum has been targeted by ma
Externí odkaz:
https://doaj.org/article/112ce893f00b4527ad8e22ffc5ea4dc0
Publikováno v:
IEEE Access, Vol 8, Pp 24153-24169 (2020)
In the use of a cloud storage, sharing of data with efficient access control is an important requirement in addition to data security and privacy. Cui et al. (IEEE Trans. on Comp. 2016) proposed key-aggregate searchable encryption (KASE), which allow
Externí odkaz:
https://doaj.org/article/b86157783a6f4608a035c82c6a7ef5a4
Publikováno v:
IEEE Access, Vol 7, Pp 74849-74868 (2019)
In ad hoc networks that allow devices to dynamically configure networks via wireless communication, a secure routing protocol is a technology that guarantees the validity of routing with the use of cryptographic authentication. The secure DSR with ID
Externí odkaz:
https://doaj.org/article/9161eea6b2934a97ba384fab8c7bb9ea
Publikováno v:
IEEE Access, Vol 7, Pp 74941-74960 (2019)
Security analysis of a web system is complicated, and thus analysis using formal methods to describe system specification mathematically has attracted attention. Some previous studies have adopted formal methods, but their models cannot express paral
Externí odkaz:
https://doaj.org/article/33c03eb804f34b6689a6dbc7f9b58d63
Autor:
Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka
Publikováno v:
IEEE Access, Vol 7, Pp 139021-139034 (2019)
A privacy-preserving framework in which a computational resource provider receives encrypted data from a client and returns prediction results without decrypting the data, i.e., oblivious neural network or encrypted prediction, has been studied in ma
Externí odkaz:
https://doaj.org/article/0b6f5f7b90144a00be9f62d9ecbb6ace
Publikováno v:
IEEE Access, Vol 6, Pp 12240-12251 (2018)
The role-based access control (RBAC) framework is a mechanism that describes the access control principle. As a common interaction, an organization provides a service to a user who owns a certain role that was issued by a different organization. Such
Externí odkaz:
https://doaj.org/article/47bbd272be214a9baeed135e06e2d138
Autor:
Ouyang JUNJIE, Naoto YANAI, Tatsuya TAKEMURA, Masayuki OKADA, Shingo OKAMURA, Jason Paul CRUZ
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :170-184
Publikováno v:
Journal of Information Processing. 30:209-225
Publikováno v:
Journal of Information Processing. 30:829-840
Autor:
Jason Paul Cruz, Naoto Yanai
Publikováno v:
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security.