Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Sedigheh Khajouei-Nejad"'
Autor:
Sedigheh Khajouei-Nejad, Hamid Haj Seyyed Javadi, Sam Jabbehdari, Seyed Mohammad Hossein Moattar
Publikováno v:
International Journal of Information and Communication Technology Research, Vol 16, Iss 1, Pp 20-27 (2024)
—In order to provide access control on encrypted data, Attribute-based encryption (ABE) defines each user using a set of attributes. Fuzzy identity-based encryption (FIBE) is a variant of ABE that allows for a threshold access structure for users.
Externí odkaz:
https://doaj.org/article/cb08b0d2c08445bcbbeac848e4b3ab57
Publikováno v:
CSIE (3)
Data mining is a branch of computer science which recently has a great use for enterprises. Applying data mining methods, huge databases have been analyzed and processed. Data mining techniques are usually hired to mine knowledge and models from enor
Publikováno v:
Asia International Conference on Modelling and Simulation
By their nature, Real-Time applications impose the conflicting goals of providing a fast algorithm and reducing the rate of error as much as possible. The Remote Terminal Units (RTU) has a real-time system to convert the data from the field into puls
Publikováno v:
Asia International Conference on Modelling and Simulation
Nowadays, an increasing amount of companies and organizations only implement their core business and outsource other application services over Internet. Besides, statistics show surprising details on the decline in the growth of the number of web ser