A review of functional encryption in IoT applications
The Internet of Things (IoT) represents a growing aspect of how entities, including humans
and organizations, are likely to connect with others in their public and private interactions …
and organizations, are likely to connect with others in their public and private interactions …
Y-DWMS: A digital watermark management system based on smart contracts
With the development of information technology, films, music, and other publications are
inclined to be distributed in digitalized form. However, the low cost of data replication and …
inclined to be distributed in digitalized form. However, the low cost of data replication and …
A watermarking protocol based on Blockchain
F Frattolillo - Applied Sciences, 2020 - mdpi.com
Digital watermarking can be used to implement mechanisms aimed at protecting the
copyright of digital content distributed on the Internet. Such mechanisms support copyright …
copyright of digital content distributed on the Internet. Such mechanisms support copyright …
A matrix translation and elliptic curve based cryptosystem for secured data communications in WSNs
In this paper, we propose a new cryptosystem based on matrix translation and Elliptic curve
cryptography for developing a secure routing algorithm to provide energy efficient and …
cryptography for developing a secure routing algorithm to provide energy efficient and …
[PDF][PDF] A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption.
C Lan, H Li, S Yin, L Teng - Int. J. Netw. Secur., 2017 - Citeseer
In the process of cloud data storage, data owner will encrypt data and upload it to the cloud,
however, this method cannot support for encrypted data sharing. Especially, when data is …
however, this method cannot support for encrypted data sharing. Especially, when data is …
Controllable software licensing system for sub-licensing
The digital rights management is mainly about license management. Take software
licensing as an example. A software license can be assigned to a user, a group of users, or …
licensing as an example. A software license can be assigned to a user, a group of users, or …
Secure data dissemination and routing in Internet of Things
S Gangadharaiah, LB Bhajantri - International Journal of Information …, 2024 - Springer
In recent years, the widespread adoption of Internet of Things applications has significantly
enhanced user experiences, productivity, and security services. However, this surge in …
enhanced user experiences, productivity, and security services. However, this surge in …
Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth
A Belel, R Dutta, S Mukhopadhyay - … on Stabilizing, Safety, and Security of …, 2023 - Springer
Cloud computing is becoming popular with emerging applications in big data analysis,
online storage, e-commerce, social network, accounting, and management. As industries …
online storage, e-commerce, social network, accounting, and management. As industries …
Check for updates Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth
A Belel, R Dutta, S Mukhopadhyay - … City, NJ, USA, October 2–4 …, 2023 - books.google.com
Cloud computing is becoming popular with emerging applications in big data analysis,
online storage, e-commerce, social network, accounting, and management. As industries …
online storage, e-commerce, social network, accounting, and management. As industries …
[PDF][PDF] Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices.
C Rajarama, JN Sugatoor, TY Swamy - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Abstract New methods for Diffie-Hellman type key exchange, ElGamal like encryption
decryption and proxy re-encryption, using circulant integer matrices as the private keys, are …
decryption and proxy re-encryption, using circulant integer matrices as the private keys, are …