Zobrazeno 1 - 10
of 2 135
pro vyhledávání: '"Proxy re-encryption"'
Publikováno v:
Tongxin xuebao, Vol 45, Pp 244-257 (2024)
To address fine-grained access control, secure sharing, and encrypted key updates in a one-to-many model, a multi-keyword attribute-based searchable encryption scheme with proxy re-encryption for cloud storage was proposed. The access tree was enhanc
Externí odkaz:
https://doaj.org/article/e22f12aadcfa4cbf9a87665476c698b6
Publikováno v:
Mathematical Biosciences and Engineering, Vol 21, Iss 6, Pp 6167-6189 (2024)
Many current electronic medical record (EMR) sharing schemes that use proxy re-encryption and blockchain do not fully consider the potential threat of malicious node impersonation attacks. This oversight could lead to data leakage as attackers masque
Externí odkaz:
https://doaj.org/article/a97877b5144147c2a9a62e2a1c531aac
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-20 (2024)
Abstract The smart collection and sharing of data is an important part of cloud-based systems, since huge amounts of data are being created all the time. This feature allows users to distribute data to particular recipients, while also allowing data
Externí odkaz:
https://doaj.org/article/e1afd9895d894b6585e47cb500c17ca3
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Wei Wu, Fulong Chen, Pinghai Yuan, Taochun Wang, Dong Xie, Chuanxin Zhao, Chao Wang, Detao Tang, Jingtao Li, Ji Zhang
Publikováno v:
Blockchain: Research and Applications, Vol 5, Iss 3, Pp 100204- (2024)
The sharing of pathological data is highly important in various applications, such as remote diagnosis, graded diagnosis, illness treatment, and specialist system development. However, ensuring reliable, secure, privacy-preserving, and efficient shar
Externí odkaz:
https://doaj.org/article/43bd5137824b44f19fe44d8d77da8890
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 6, Pp 102105- (2024)
The construction of IoT cloud platform brings great convenience to the storage of massive IoT node data. To ensure security of data collected by the IoT nodes, the data must be encrypted when the nodes upload it. However, it arises some challenge pro
Externí odkaz:
https://doaj.org/article/2d07db6719504f3a994627e947942b83
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-13 (2024)
Abstract With the rapid development of the Internet of Medical Things (IoMT) and the increasing concern for personal health, sharing Electronic Medical Record (EMR) data is widely recognized as a crucial method for enhancing the quality of care and r
Externí odkaz:
https://doaj.org/article/3c76be0710694018844fe5e32327197e
Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks
Publikováno v:
IEEE Access, Vol 12, Pp 23290-23304 (2024)
In the realm of wireless sensor networks (WSNs), preserving data integrity, privacy, and security against cyberthreats is paramount. Proxy re-encryption (PRE) plays a pivotal role in ensuring secure intra-network communication. However, existing PRE
Externí odkaz:
https://doaj.org/article/b150b3d228d54c19900942f1057798ee
Autor:
Somchart Fugkeaw
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-14 (2023)
Abstract Implementing a trust and secure immunity or vaccine passport verification system is now crucial for many countries. The system typically aims to enable the secure access control and verification of vaccination records which will be used by t
Externí odkaz:
https://doaj.org/article/db3272103cd74f1f8828c07d86bb528a