Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








12 Hits in 6.8 sec

Hash Function Based Keyword Searchable Encryption Framework in Cloud Server Using MD5 and MECC

R. Lakshmana Kumar, R. Subramanian, S. Karthik
2021 Journal of Information Hiding and Privacy Protection  
This issue could be solved by using various algorithms like the Certificateless Hashed Public Key Authenticated Encryption with Keyword Search (CL-HPAEKS) which utilizes the Modified Elliptic Curve Cryptography  ...  The use of Public Key Encryptions with keyword search (PEKS) provides security against the untrustworthy thirdparty search capability on publicly encryption keys without revealing the data's contents.  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/jihpp.2021.027834 fatcat:llr3bovmmbc5rntw6mmgom6ktm

A Review of Functional Encryption in IoT Applications

Khurram Shahzad, Tanveer Zia, Emad-ul-Haq Qazi
2022 Sensors  
Functional encryption is an exciting new paradigm of public-key encryption that supports fine-grained access control, generalizing a range of existing fine-grained access control mechanisms.  ...  The Internet of Things (IoT) represents a growing aspect of how entities, including humans and organizations, are likely to connect with others in their public and private interactions.  ...  PE with Equality Testing in Cloud Computing-The work in [109] presented the concept of attribute-hiding PE with an equality test by incorporating the notions of publickey encryption with the equality  ... 
doi:10.3390/s22197567 pmid:36236664 pmcid:PMC9573314 fatcat:slcetffyzzfffdq4gav72yvfly

Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things

Bin Wu, Caifen Wang, Hailong Yao, He Debiao
2020 PLoS ONE  
Compared with other certificateless public key searchable encryption schemes, this scheme has higher security and comparable efficiency.  ...  With the rapid development of informatization, an increasing number of industries and organizations outsource their data to cloud servers, to avoid the cost of local data management and to share data.  ...  Author Contributions Conceptualization: Bin Wu, Caifen Wang, Hailong Yao.  ... 
doi:10.1371/journal.pone.0230722 pmid:32271788 fatcat:f63n4b52xbesdlsz2jrlh6jzvq

Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions

Wenjuan Li, Jiyi Wu, Jian Cao, Nan Chen, Qifei Zhang, Rajkumar Buyya
2021 Journal of Cloud Computing: Advances, Systems and Applications  
However, a large amount of evidence shows that cloud computing is facing with serious security and trust crisis, and building a trust-enabled transaction environment has become its key factor.  ...  Its unique features in operating rules and traceability of records ensure the integrity, undeniability and security of the transaction data.  ...  Acknowledgments The authors would like to thank the support of the laboratory, university and government, and the hard work of the editors and reviewers.  ... 
doi:10.1186/s13677-021-00247-5 fatcat:ncwagc2rhzgrxfrc4u3kabel4i

Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks

Peng Xu, Shuanghong He, Wei Wang, Willy Susilo, Hai Jin
2018 IEEE Transactions on Industrial Informatics  
Searchable public-key encryption (SPE) is a promising method to address this problem.  ...  In theory, it allows sensors to upload public-key ciphertexts to the cloud, and the owner of these sensors can securely delegate a keyword search to the cloud and retrieve the intended data while maintaining  ...  Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks I.  ... 
doi:10.1109/tii.2017.2784395 fatcat:untiuzkq4zfjvpm6fpcz2fp2iu

2021 Index IEEE Internet of Things Journal Vol. 8

2021 IEEE Internet of Things Journal  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  Note that the item title is found only under the primary entry in the Author Index.  ...  ., +, JIoT Oct. 1, 2021 14874-14895 Encryption Heterogeneous Signcryption With Equality Test for IIoT Environment.  ... 
doi:10.1109/jiot.2022.3141840 fatcat:42a2qzt4jnbwxihxp6rzosha3y

Survey on cyberspace security

HuanGuo Zhang, WenBao Han, XueJia Lai, DongDai Lin, JianFeng Ma, JianHua Li
2015 Science China Information Sciences  
Cyberspace is the collection of all information systems; it is the information environment for human survival. Therefore, it is necessary to ensure the security of cyberspace.  ...  Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace.  ...  We would like to thank the following for their help in writing this article: FU JianMin, ZHANG LiQiang, YUAN Wei, XI Ning, LU Di, WU Jun.  ... 
doi:10.1007/s11432-015-5433-4 fatcat:b2tv6gvovngxhlz7iukug2ehiy

2020 Index IEEE Transactions on Vehicular Technology Vol. 69

2020 IEEE Transactions on Vehicular Technology  
+ Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex  ...  Dec. 2020 16218-16223 Hoon-Kim, T., see Kumar, G., TVT July 2020 7707-7722 Horlin, F., see Monfared, S., TVT Oct. 2020 11369-11382 Horng, S., Lu, C., and Zhou, W., An Identity-Based and Revocable Data-Sharing  ...  ., +, TVT June 2020 5799-5812 A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.  ... 
doi:10.1109/tvt.2021.3055470 fatcat:536l4pgnufhixneoa3a3dibdma

2021 Index IEEE Transactions on Vehicular Technology Vol. 70

2021 IEEE Transactions on Vehicular Technology  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  Note that the item title is found only under the primary entry in the Author Index.  ...  ., +, TVT Nov. 2021 Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation.  ... 
doi:10.1109/tvt.2022.3151213 fatcat:vzuzqu54irebpibzp3ykgy5nca

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+115 others)
2017 International Journal of Network Security   unpublished
Encryption can be complex and difficult without infrastructure. It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application.  ...  With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications.  ...  The authors gratefully acknowledge the anonymous reviewers for their valuable comments. Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 
fatcat:vy4pp4thsfcrpakpwdjmdgjuoy

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+97 others)
2016 International Journal of Network Security   unpublished
Most of the privacy-protection schemes adopting chaotic maps are usually by symmetric cryptography for guaranteeing identity hiding. This will lead to a high calculated amount.  ...  Then a new PPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function.  ...  Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments. Acknowledgments  ... 
fatcat:3gborlznmrac3ebiwzxjjy5jly

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+100 others)
2016 International Journal of Network Security   unpublished
For this reason, we do not need the certificate authority (CA) to store and manage users' certificates and public keys.  ...  Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional signature system.  ...  The authors gratefully acknowledge the reviewers for their valuable comments.  ... 
fatcat:u6ux7gsrj5efxp3xc4y2gpmahu