Sign Up to like & get
recommendations!
1
Published in 2017 at "International Journal of Information Security"
DOI: 10.1007/s10207-017-0375-z
Abstract: This paper presents AES4SeC, a security scheme fully constructed over cryptographic pairings. The main building blocks of AES4SeC are attribute-based encryption (ABE) and short signatures (SSign), with generalized constructions for the Type 3 pairing. AES4SeC…
read more here.
Keywords:
approach data;
security;
cryptographic approach;
based cryptographic ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-021-03109-9
Abstract: A field of information security provides an efficiency to manage the records over remote server with proper privacy preserving norms. These kinds of information privacy are required today to maintain ones record into the server…
read more here.
Keywords:
information security;
data security;
security;
blockchain ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Cognitive Systems Research"
DOI: 10.1016/j.cogsys.2019.02.008
Abstract: Abstract This article presents new methods of cognitive computational paragigms dedicated to data security solutions. Especially, these paragidms will be presented based on new, combined classes of threshold schemes – names linguistic-biometric threshold schemes. Linguistic,…
read more here.
Keywords:
threshold schemes;
security;
protocols data;
data security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Soft matter"
DOI: 10.1039/d2sm00890d
Abstract: Developing advanced materials for highly secure data-encryption is crucial but very challenging, as most data-encryption materials (the message area) are chemically different from the substrates (the background) on which they are being written, leading to…
read more here.
Keywords:
data security;
data encryption;
encryption;
level ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Journal of Risk Research"
DOI: 10.1080/13669877.2025.2485038
Abstract: Abstract With the rapid development of the global digital economy and the expanding ecosystem of the Internet of Vehicles (IoV), the risks associated with connected vehicles, such as data security, software vulnerabilities, communication hijacking, and…
read more here.
Keywords:
connected vehicles;
data security;
response;
coping behaviours ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3028686
Abstract: The new generation of wireless body area networks (WBAN) for the internet of things (IoT) is emerging in a fast-paced. Today patients can be tested using remote clinical nanosensors. WBAN involves small interconnected sensors for…
read more here.
Keywords:
body area;
area networks;
data security;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3144632
Abstract: The world is facing a growth in the amount and variety of data generated by both users and machines. Despite the exponential increases, the tools and technologies developed to manage these data volumes are not…
read more here.
Keywords:
data security;
fragmentation;
big data;
blockchain technology ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3221109
Abstract: With the rapid development of the social economy, the problem of environmental pollution has been widely concerned. The existing environmental monitoring system adopts a hierarchical centralized management structure, which has some problems, such as data…
read more here.
Keywords:
data security;
monitoring data;
security;
monitoring ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3385449
Abstract: Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing. Cloud storage is popular among individuals and…
read more here.
Keywords:
cloud computing;
comprehensive review;
analysis;
cryptography ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3447075
Abstract: This article proposes a novel double data security algorithm that first encrypts sensitive data using a two-stage encryption method based on numerical solutions from a fractional-order memristive coupled neural network system. Solutions are obtained to…
read more here.
Keywords:
memristive coupled;
coupled neural;
encryption;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2019.2963303
Abstract: SQLite, one of the most popular light-weighted database system, has been widely used in various systems. However, the compact design of SQLite did not make enough consideration on user data security. Specifically, anyone who has…
read more here.
Keywords:
sqlite high;
database;
cryptsqlite sqlite;
high data ... See more keywords