Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Shiuan-Tzuo Shen"'
Autor:
Shiuan-Tzuo Shen, 沈宣佐
96
We propose a fully collusion resistant public key broadcast encryption scheme that achieves O(1) public key size, O(log n) private key size, O(r) ciphertext size, and O(1) decryption time where n is the number of users in the system and r is
We propose a fully collusion resistant public key broadcast encryption scheme that achieves O(1) public key size, O(log n) private key size, O(r) ciphertext size, and O(1) decryption time where n is the number of users in the system and r is
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/52271460599748059312
Autor:
Shiuan-Tzuo Shen1 vink@cs.nctu.edu.tw, Wen-Guey Tzeng1 wgtzeng@cs.nctu.edu.tw
Publikováno v:
Journal of Computer Security. 2015, Vol. 23 Issue 4, p471-508. 38p.
Autor:
Wen-Guey Tzeng, Shiuan Tzuo Shen
Publikováno v:
Journal of Computer Security. 23:471-508
Publikováno v:
IEEE Transactions on Reliability. 64:840-851
In the application of cloud storage, a user no longer possesses his files in his local depository. Thus, he is concerned about the security of the stored files. Data confidentiality and data robustness are the main security issues. For data confident
Publikováno v:
Provable Security ISBN: 9783319260587
ProvSec
ProvSec
We give a simple and efficient construction of unique signature on groups equipped with bilinear map. In contrast to prior works, our proof of security is based on computational Diffie-Hellman problem in the random oracle model. Meanwhile, the result
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1d506543368653abd46b01fc06f44a90
https://doi.org/10.1007/978-3-319-26059-4_26
https://doi.org/10.1007/978-3-319-26059-4_26
Publikováno v:
AINA
With the increasing popularity of cloud computing, Hadoop has become a widely used open source cloud computing framework for large scale data processing. However, few studies have been done to enhance data confidentiality of Hadoop against storage se
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783642312830
ACNS
ACNS
Fine-grained meter readings enable applications in an advanced metering infrastructure. However, those meter readings threaten personal privacy by implying a sketch of daily activities of households. The privacy issue has been addressed in smart mete
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8d51948d7795b2825a65fb0d1d275026
https://doi.org/10.1007/978-3-642-31284-7_32
https://doi.org/10.1007/978-3-642-31284-7_32
Autor:
Wen-Guey Tzeng, Shiuan-Tzuo Shen
Publikováno v:
Information and Communications Security ISBN: 9783642252426
ICICS
ICICS
Many storage systems need to do authorized verification for data integrity. For example, a user stores his data into cloud storage servers and shares his data with his friends. They check data integrity periodically to ensure data intact. However, th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4dc1765fe0fada0c999ca97d98e3d628
https://doi.org/10.1007/978-3-642-25243-3_8
https://doi.org/10.1007/978-3-642-25243-3_8
Publikováno v:
Journal of Information Science & Engineering; Jan2017, Vol. 33 Issue 1, p233-250, 18p