[HTML][HTML] Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey
A Peñuelas-Angulo, C Feregrino-Uribe… - Internet of Things, 2023 - Elsevier
Attribute-based encryption (ABE) is a powerful cryptographic approach for providing fine-
grained access control and confidentiality security services. ABE is well suited for cloud …
grained access control and confidentiality security services. ABE is well suited for cloud …
Intelligent Music Wireless Signal Multi-feature Evaluation System Based on ABE Algorithm
D Zeng - … International Conference on Computer Simulation and …, 2023 - ieeexplore.ieee.org
The integration of music and artificial intelligence technology has brought more possibilities
to the music industry today. The application of artificial intelligence in music is reflected in …
to the music industry today. The application of artificial intelligence in music is reflected in …
Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir's Secret Sharing Scheme
MNS Perera, T Nakamura, T Matsunaka… - … Conference on Network …, 2023 - Springer
This paper delivers a post-quantum construction for group-oriented attribute-based
encryption (GO-ABE) using lattice-based cryptography. The GO-ABE scheme enables users …
encryption (GO-ABE) using lattice-based cryptography. The GO-ABE scheme enables users …
[HTML][HTML] OO-MA-KP-ABE-CRF: Online/Offline Multi-Authority Key-Policy Attribute-Based Encryption with Cryptographic Reverse Firewall for Physical Ability Data
Y Zhao, Y Fan, X Bian - Mathematics, 2023 - mdpi.com
In many universities, students' physical ability data are collected and stored in the cloud
through various sensing devices to save computational and storage costs. Therefore, how to …
through various sensing devices to save computational and storage costs. Therefore, how to …
Access Control and Encryption Techniques during Big Data Accessing Stage
S Ahmed, A Dubey, A Rasool… - 2023 14th …, 2023 - ieeexplore.ieee.org
Privacy issues and data security are made worse by Big Data's velocity, volume, and variety.
Being able to extract information from enormous amounts of data has gained relevance. The …
Being able to extract information from enormous amounts of data has gained relevance. The …
Multilayer privacy‐preserving model for security and privacy access control in edge computing
K Karthikeyan, P Madhavan - Concurrency and Computation …, 2023 - Wiley Online Library
In a recent scenario of a computing environment, the Internet of Things (IoT) provides a
greater impact in several applications and services. For that Edge Computing techniques …
greater impact in several applications and services. For that Edge Computing techniques …
Implementing Hierarchical Attribute Set Based Encryption Over Key-Policy Attribute Based Encryption
P Surendran, B Thomas - 2023 IEEE 8th International …, 2023 - ieeexplore.ieee.org
The use of Internet and cloud storage is increasing daily and hence issues related to cloud
security are also increasing day-by-day. In this research, we are trying to find a solution that …
security are also increasing day-by-day. In this research, we are trying to find a solution that …
Privacy-Driven E2E Secure Data Exchange for Value Chains
A Mosteiro Sánchez - 2023 - addi.ehu.es
Digitalization is an unstoppable phenomenon that affects all facets of life and society. That
includes the industrial sector, where the paradigm is shifting towards distributed automated …
includes the industrial sector, where the paradigm is shifting towards distributed automated …
[PDF][PDF] Internet of Things
A Peñuelas-Angulo, C Feregrino-Uribe… - researchgate.net
Attribute-based encryption (ABE) is a powerful cryptographic approach for providing
finegrained access control and confidentiality security services. ABE is well suited for cloud …
finegrained access control and confidentiality security services. ABE is well suited for cloud …
[HTML][HTML] Разработка схемы контроля доступа к данным на основе иерархии ролей с использованием постквантовых математических преобразований
АВ Ярмак - Труды учебных заведений связи, 2022 - cyberleninka.ru
В работе представлена схема CSIDH-HRBAC, основанная на постквантовых
математических преобразованиях и позволяющая реализовать контроль доступа к …
математических преобразованиях и позволяющая реализовать контроль доступа к …