Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2935180
Abstract: Collusion between revoked users and cloud service providers can pose a threat to the security of cloud storage data. If the original legitimate users cannot be revoked securely, it will lead to the leakage of…
read more here.
Keywords:
storage;
revocation;
audit;
cloud storage ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3027718
Abstract: With the development of Intelligent Transportation Systems (ITS), Vehicular Ad hoc Networks (VANETs) have become a research hotspot in recent years. However, the vehicle communication system is vulnerable, resulting in threats to the privacy of…
read more here.
Keywords:
scheme;
revocation;
pseudonym revocation;
privacy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3160171
Abstract: Despite the decisive contribution of intelligent transport systems in road safety, they also open new vulnerabilities to cyber-attacks, particularly vehicle position-linked attacks. For that reason, centralized systems are becoming increasingly vulnerable to the growth of…
read more here.
Keywords:
time;
revocation;
blockchain based;
real time ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3220980
Abstract: The cooperative works between connected smart devices in the Industrial Internet of Things (IIoT) have greatly made the growth in productivity and economics for the conventional industry. However, due to the introduction of the communication…
read more here.
Keywords:
data sharing;
short revocation;
revocation;
revocation list ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2018.2829880
Abstract: Cloud storage auditing schemes for shared data refer to checking the integrity of cloud data shared by a group of users. User revocation is commonly supported in such schemes, as users may be subject to…
read more here.
Keywords:
user revocation;
storage auditing;
revoked user;
revocation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Services Computing"
DOI: 10.1109/tsc.2021.3071859
Abstract: Lately, many cloud-based applications proposed attribute-based encryption (ABE) as an all-in-one solution for achieving confidentiality and access control. Within this paradigm, data producers store the encrypted data on a semi-trusted cloud server, and users, holding…
read more here.
Keywords:
revocable abe;
revocation undoing;
revocation;
cloud server ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v10.i2.pp654-663
Abstract: Due to the advent developments in the Information and Communication Technology (ICT) based environment, Mobile ad hoc networks (MANETs) have fascinated much concentration because of their mobility and easy deployment. At the same time, their…
read more here.
Keywords:
manet;
revocation;
certificate revocation;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2022 at "Maastricht Journal of European and Comparative Law"
DOI: 10.1177/1023263x221138957
Abstract: Temporariness of refugee protection has started to emerge as a new standard in the policies of European countries. Given this development, the article focuses on one specific issue related to this temporariness: how refugee status…
read more here.
Keywords:
revocation;
temporariness refugee;
status;
residence ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Informatica"
DOI: 10.15388/22-infor474
Abstract: To resolve both certificate management and key escrow problems, a certificateless public-key system (CLPKS) has been proposed. However, a CLPKS setting must provide a revocation mechanism to revoke compromised users. Thus, a revocable certificateless public-key…
read more here.
Keywords:
revocation;
leakage resilient;
revocable certificateless;
outsourced revocation ... See more keywords