ATTRIBUTE-BASED AUTHENTICATION SCHEMES: A SURVEY
نویسندگان
چکیده
منابع مشابه
Applied Attribute-based Encryption Schemes
The advent of new cryptographic methods in recent years also includes schemes related to functional encryption. Within these schemes Attribute-based Encryption (ABE) became the most popular, including ciphertext-policy and key-policy ABE. ABE and related schemes are widely discussed within the mathematical community. Unfortunately, there are only a few implementations circulating within the com...
متن کاملA Survey of User Authentication Schemes for Mobile Device
Personal mobile devices (PMDs) have become ubiquitous technology. There, steadily increasing computational and storage capabilities have enabled them to over an increasingly large set of services. Mobile devices offer their users lots of possibilities and a feeling of freedom. However, this freedom comes along with new security threats. Sensitive data might be stolen and abused, if an unauthori...
متن کاملA Survey of Security Threats and Authentication Schemes in WiMAX
WiMAX networks have advantages over the wired network, such as convenience, mobility, and flexibility. The security concerns in this network may prevent its further widespread adoption. Hence, improving the security of WiMAX is of considerable importance. In WiMAX networks by providing security features like authentication, authorization and encryption. The absence of proper authentication mech...
متن کاملSemifragile Watermarking Schemes for Image Authentication- A Survey
Digital images are very easy to manipulate, store, publish and secondary creation this juggle will lead to serious consequence in some applications such as military image, medical image. So, integrity of digital image must be authenticated. Tools that help us establish the authenticity and integrity of digital media are thus essential and can prove vital whenever questions are raised about the ...
متن کاملA Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments
In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attributes have been exploited to generate a public key for encrypting data and have been used as an access policy to control users’ access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the access structure on the user’s private key, and the ciphertext-policy i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing
سال: 2015
ISSN: 2312-5381,1727-6209
DOI: 10.47839/ijc.14.2.805