Filters








2,007 Hits in 2.9 sec

Efficient Methods for Integrating Traceability and Broadcast Encryption [chapter]

Eli Gafni, Jessica Staddon, Yiqun Lisa Yin
<span title="">1999</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, we study general methods for integrating traceability and broadcasting capability.  ...  In particular, we present a method for adding any desired level of broadcasting capability to any traceability scheme and a method for adding any desired level of traceability to any broadcast encryption  ...  Acknowledgments We would like to thank Beverly Schmoock, Yuan Ma, Satomi Okazaki and everyone at RSA Labs in San Mateo, CA for their help in preparing this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-48405-1_24">doi:10.1007/3-540-48405-1_24</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l6wasrqjhvaqjo4tat7zkb66jq">fatcat:l6wasrqjhvaqjo4tat7zkb66jq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180729025750/https://link.springer.com/content/pdf/10.1007%2F3-540-48405-1_24.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5c/d6/5cd65b2caf3d5106091099cf81bcf1e8e34783bd.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-48405-1_24"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Traitor Tracing Scheme Based on RSA for Fast Decryption [chapter]

John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Traitor tracing schemes deter piracy in broadcast encryption systems by enabling the identification of authorized users known as traitors that contribute to unauthorized pirate decoders.  ...  The proposed scheme improves upon the decryption efficiency of past traitor tracing proposals.  ...  Acknowledgements The authors thank Scott Contini, Jeremy Horwitz, Joe Kilian, and Benny Pinkas for their suggestions and pointers regarding the security analysis.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11496137_5">doi:10.1007/11496137_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/odmxaynh4zfzhomg34c77dbyku">fatcat:odmxaynh4zfzhomg34c77dbyku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20060427062957/http://palms.ee.princeton.edu:80/PALMSopen/mcgregor05traitortracing_springer.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7f/93/7f93e8f9471fb2a7d21355f7f22803de88cf5d6f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11496137_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Broadcast Message Authentication Mechanism to Detect Clone and Sybil attacks in VANET's based on ID-Based Signature Scheme

Kareemulla Shaik, Md. Ali Hussain
<span title="2018-07-20">2018</span> <i title="Science Publishing Corporation"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/piy2nrvrjrfcfoz5nmre6zwa4i" style="color: black;">International Journal of Engineering &amp; Technology</a> </i> &nbsp;
Broadcast Communication is crucial in VANET communication, to send and receive safety messages within network.  ...  In this paper we propose a secure broadcast message authentication and attack detection mechanism with Identity – Based Signatures.  ...  During the data communication, each vehicle communicates with the other entities using the integrity verification method and the encryption method.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14419/ijet.v7i3.12.17770">doi:10.14419/ijet.v7i3.12.17770</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ln4ruhibf5f6lmvlecft7cmxim">fatcat:ln4ruhibf5f6lmvlecft7cmxim</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200210151715/https://www.sciencepubco.com/index.php/ijet/article/download/17770/7858" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0e/48/0e48c5df31ac21e4a04893bdbcd3fbb73ad23a81.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14419/ijet.v7i3.12.17770"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks

W. Ahmad, A. Khokhar
<span title="">2007</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jtcdcetsmvdmjcshq24lhzakwu" style="color: black;">2007 IEEE International Conference on Communications</a> </i> &nbsp;
Our experiment results show that the proposed broadcast encryption scheme is highly scalable and the integrity verification is extremely efficient both in terms of computation and communication.  ...  SAMcast is the first protocol, to the best of our knowledge, which provides an efficient integrity verification mechanism along with public key based broadcast encryption.  ...  ACKNOWLEDGEMENTS This work was partially supported by the following NSF grants: CNS-0646819 and IIS-0534438.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icc.2007.248">doi:10.1109/icc.2007.248</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icc/AhmadK07.html">dblp:conf/icc/AhmadK07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/psktembrjjcrjg473rse74csgi">fatcat:psktembrjjcrjg473rse74csgi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070418050159/http://www2.uic.edu/~wahmad1/papers/TR_SAMcast.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f6/8c/f68c5af19976eaec3f1af4a47e9100c0d49fbb80.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icc.2007.248"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Review on Cloud Data Security and its Mitigation Techniques

K. Selvamani, S. Jayanthi
<span title="">2015</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cx3f4s3qmfe6bg4qvuy2cxezyu" style="color: black;">Procedia Computer Science</a> </i> &nbsp;
Cloud providers offer several storage services for their users in efficient manner.  ...  Cloud users are allowed to store their data in cloud server using cloud storage and reduce the burden of storing and retrieving in local machine.  ...  Group signature and dynamic broadcast encryption technique are used to share a data with other members in a group.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procs.2015.04.192">doi:10.1016/j.procs.2015.04.192</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tawpw3p2izhc3elenwn5c23aai">fatcat:tawpw3p2izhc3elenwn5c23aai</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190304032807/https://core.ac.uk/download/pdf/82815515.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/28/67/2867a278660d1ec508426f91b929b4e10cbbef04.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procs.2015.04.192"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing

David Megías, Minoru Kuribayashi, Amna Qureshi
<span title="2020-04-03">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mvyhkzd6pbcqznrpy72k57bd6y" style="color: black;">Computers</a> </i> &nbsp;
The paper reviews recent digital fingerprinting solutions that are available for two particularly relevant scenarios: peer-to-peer distribution networks and broadcasting.  ...  Finally, some directions for further research on this topic are suggested.  ...  Some recent works seem to provide quite effective and efficient methods for each case, but, after some analysis, it becomes apparent that fingerprinting schemes for the broadcasting of live events (e.g  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/computers9020026">doi:10.3390/computers9020026</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xonziwqjzzdkbkmlrqhpcdt4cm">fatcat:xonziwqjzzdkbkmlrqhpcdt4cm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200404020626/https://res.mdpi.com/d_attachment/computers/computers-09-00026/article_deploy/computers-09-00026.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4a/6d/4a6d27f61956161e689a3f1e42fc326ceae82f50.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/computers9020026"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Enforcing traceability in software [chapter]

Colin Boyd
<span title="">1997</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
These are compared with the methods used to ensure compliance in escrow schemes, the context in which traceability has usually arisen.  ...  Firstly the aims of traceable communications protocols are reviewed and compared with the available mechanisms to ensure compliance.  ...  Acknowledgements I am very grateful to Ed Dawson of QUT, and to Wenbo Mao of Hewlett Packard, for many constructive critical comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0028495">doi:10.1007/bfb0028495</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ocx4qbwtibfglmatbjylwizj5q">fatcat:ocx4qbwtibfglmatbjylwizj5q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160727135402/http://profs.sci.univr.it/~giaco/download/Watermarking-Obfuscation/treacability%20of%20SW.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f9/88/f9888f14a3286220781c7d8a1c4d45719a602b09.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/bfb0028495"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure Cloud File Distribution System for Untrusted Network Environment

William Asiedu, University of Education, Winneba. College of Technology Education - Kumasi
<span title="2018-07-23">2018</span> <i title="ESRSA Publications Pvt. Ltd."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3j6n6lpsjndinobmibtprywohe" style="color: black;">International Journal of Engineering Research and</a> </i> &nbsp;
Our proposed scheme allows users anonymously share their files among members by using group signature and broadcast encryption techniques.  ...  Cloud computing provides reliable and efficient services for sharing data among cloud users at low maintenance cost.  ...  It is predicted that fast and secure re-encryption will become increasingly popular as a method for managing encrypted file systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17577/ijertv7is070099">doi:10.17577/ijertv7is070099</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gqbxdwcg45d3ho67ss65pua6pm">fatcat:gqbxdwcg45d3ho67ss65pua6pm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200318061530/https://www.ijert.org/research/secure-cloud-file-distribution-system-for-untrusted-network-environment-IJERTV7IS070099.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/84/c5/84c5d82ab45f4d467269a5b5b5c19165870fc0ff.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17577/ijertv7is070099"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Scalable and Secure Group Key Management Method for Secure V2V Communication

Hayotjon Aliev, HyungWon Kim, Sunghyun Choi
<span title="2020-10-28">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
The simulation results show that the proposed method can reduce computation time for group key generation and message encryption by more than 80% compared to existing methods.  ...  To address the providing confidentiality of vehicle-to-vehicle (V2V) broadcasting, we propose a group key management and message encryption method that is secure, lightweight, and scalable.  ...  The proposed scheme introduces a matrix-based scalable and secure group key management method (2SGKM) and the message encryption (ME) method for V2V group communications.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20216137">doi:10.3390/s20216137</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/33126693">pmid:33126693</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/movv5iwt2jetnodveirrnftxlu">fatcat:movv5iwt2jetnodveirrnftxlu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201210015835/https://res.mdpi.com/d_attachment/sensors/sensors-20-06137/article_deploy/sensors-20-06137-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/cc/e7cce97c93955bf05fa9c9e481569b5c539c0d03.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20216137"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

RS-MONA: Reliable and Scalable Secure Method to Store and Share Secrete Data for groups in Cloud

Sunita R.Patil, Sandeep Kadam
<span title="2014-09-18">2014</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
more .This method claims required reliability ,security,scalability and most importantly efficiency..  ...  The main objective of this paper include: to provide security for dynamic group system integrates Image based authentication and one time password (OTP) to achieve high level of security.  ...  encryption [9] "Broadcast Encryption" byFiat and M.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/17794-8595">doi:10.5120/17794-8595</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/walzvoihxbafjj6uxebiexazpy">fatcat:walzvoihxbafjj6uxebiexazpy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706113944/http://research.ijcaonline.org/volume102/number3/pxc3898595.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e9/73/e9736580081c950437c85c8838996387c76c09d0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/17794-8595"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Multi-Chain Collaboration-Based Information Management and Control for the Rice Supply Chain

Xiangzhen Peng, Xin Zhang, Xiaoyi Wang, Haisheng Li, Jiping Xu, Zhiyao Zhao
<span title="2022-05-12">2022</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6iatzfbfmfbi5o7oaltji6olja" style="color: black;">Agriculture</a> </i> &nbsp;
This study applies new information technology to the coordination and resource sharing of the food supply chain and provides ideas for the digital transformation of the food industry.  ...  Based on this model, the following four mechanisms are designed: a trusted chain mechanism, a multi-level sub-chain encryption mechanism, a trusted supervision mechanism, and a hierarchical consensus mechanism  ...  For different consensus requests, the model adopts different consensus methods to ensure efficient consensus among multi-chain nodes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/agriculture12050689">doi:10.3390/agriculture12050689</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4ugqjqy3wnhkfknygyfzqe6tke">fatcat:4ugqjqy3wnhkfknygyfzqe6tke</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220514213339/https://mdpi-res.com/d_attachment/agriculture/agriculture-12-00689/article_deploy/agriculture-12-00689.pdf?version=1652348869" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/df/afdf1696d946accc7e6463ad86bcb0c45697630c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/agriculture12050689"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

CPAAS: an efficient conditional privacy-preservation anonymous authentication scheme using signcryption in VANET

Meenakshi Gupta, Poonam Gera, Bharavi Mishra
<span title="">2021</span> <i title="Inderscience Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/glti55pj6zbknmgqmcpcixrrze" style="color: black;">International Journal of Vehicle Information and Communication Systems</a> </i> &nbsp;
mutual authentication, integrity, non-repudiation, and confidentiality.  ...  The security analysis of our approach demonstrates the efficiency and effectiveness of our proposed scheme.  ...  Authentication, integrity, and confidentiality are achieved by signature and encryption, respectively.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijvics.2021.113485">doi:10.1504/ijvics.2021.113485</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yv72cucotfcwpikmw2xhno52dq">fatcat:yv72cucotfcwpikmw2xhno52dq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220308230054/http://www.inderscience.com/storage/f631051119127248.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/fe/e7fe4f0b67942b38ac061d195e6e3839b763531f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijvics.2021.113485"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments

Xiaochun Cheng, Zheli Liu, Xiaojiang Du, Shui Yu, Leonardo Mostarda
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
attacks without random oracle, and provides anonymity, traceability, and privacy for the VANETs.  ...  As a result, the chances of data leakage or privacy infringement also increase, along with the need for new solutions for digital security and privacy protection.  ...  The article ''A secure and efficient data integrity verification scheme for cloud-IoT based on short signature,'' by Zhu et al., aims to ensure data integrity and availability in the cloud and IoT storage  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3075818">doi:10.1109/access.2021.3075818</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7t3tgqarsndc5dq2gulr7hapzi">fatcat:7t3tgqarsndc5dq2gulr7hapzi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210521060735/https://ieeexplore.ieee.org/ielx7/6287639/9312710/09430649.pdf?tp=&amp;arnumber=9430649&amp;isnumber=9312710&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9a/00/9a007c6fda907d5b5c9dada36393f8049c51d2f3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3075818"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

An Efficient Anonymous Location Service for Geographic Ad Hoc Routing in MANET

Sathya. B, Umarani. S, Archana. S.S, Rajeshwari. P, Sumathi. V.S
<span title="2013-11-01">2013</span> <i title="Association of Technology and Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lhvdmzuqxreinc3m4ancngr4qi" style="color: black;">International Journal of Computer Applications Technology and Research</a> </i> &nbsp;
A finer classification of reactive routing methods includes hop-byhop encryption and redundant traffic routing which either generate high cost or cannot provide full anonymity protection to data sources  ...  Anonymous routing schemes in MANETs can be classified into on-demand or reactive routing methods, proactive routing methods and anonymous middleware routing method.  ...  ., group signatures), ALARM provides both security and privacy features, including node authentication, data integrity, anonymity, and non-traceability (tracking-resistance).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7753/ijcatr0206.1022">doi:10.7753/ijcatr0206.1022</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zqlrimvpzvhv5prjddlkwrzeaa">fatcat:zqlrimvpzvhv5prjddlkwrzeaa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604142630/http://www.ijcat.com/archives/volume2/issue6/ijcatr02061022.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7f/aa/7faae2ea68ce7d0ebcc6df0ae4e8aeeed3e3f6ca.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7753/ijcatr0206.1022"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Public Cloud Secure Group Sharing and Accessing in Cloud Computing

R. Megiba Jasmine, G. M. Nishibha
<span title="2015-07-07">2015</span> <i title="Indian Society for Education and Environment"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wffwpj3q45g5zfjzfeyagk5uea" style="color: black;">Indian Journal of Science and Technology</a> </i> &nbsp;
To preserve data privacy, a basic solution is to encrypt data files, and then upload the encrypted data into the cloud.  ...  The storage overhead and encryption computation cost of our scheme are independent with the number of revoked users.  ...  Fiat and M. Naor 6 they introduce new theoretical measures for the qualitative and quantitative assessment of encryption schemes designed for broadcast transmissions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2015/v8i15/75177">doi:10.17485/ijst/2015/v8i15/75177</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ycu3noxgk5bcdoqcodkdviqi2i">fatcat:ycu3noxgk5bcdoqcodkdviqi2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190426164519/http://www.indjst.org/index.php/indjst/article/download/75177/58521" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2015/v8i15/75177"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 2,007 results