نتایج جستجو برای: modiriat abe shahri

تعداد نتایج: 1929  

Journal: :IACR Cryptology ePrint Archive 2014
Zhengjun Cao Lihua Liu

Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based on user attributes is a type of one-to-many encryption. Unlike the conventional one-to-one encryption which has no intention to exclude any partners of the intended receiver from obtaining the plaintext, an ABE system tries to exclude some unintended recipients from obtaining the plaintext whether they are...

2011
Allison Bishop Brent Waters

In this work, we present HIBE and ABE schemes which are “unbounded” in the sense that the public parameters do not impose additional limitations on the functionality of the systems. In all previous constructions of HIBE in the standard model, a maximum hierarchy depth had to be fixed at setup. In all previous constructions of ABE in the standard model, either a small universe size or a bound on...

Journal: :Journal of molecular microbiology and biotechnology 2007
Jui-shen Chiao Zhi-hao Sun

The acetone-butanol-ethanol (ABE) fermentation industry in China was started in the early 1950s in Shanghai and expanded rapidly thereafter. At its peak, there were about 30 plants all over the country and the total annual production of solvents reached 170,000 tons. This large enterprise was compelled to complete shutdown at the end of the 20th century due to the rapid increase of petrochemica...

Journal: :IACR Cryptology ePrint Archive 2015
Sébastien Canard Viet Cuong Trinh

Attribute-based encryption (ABE) is an extension of traditional public key encryption in which the encryption and decryption phases are based on user’s attributes. More precisely, we focus on ciphertext-policy ABE (CP-ABE) where the secret-key is associated to a set of attributes and the ciphertext is generated with an access policy. It then becomes feasible to decrypt a ciphertext only if one’...

The evolution of texture was discussed during the formation of ultra-fine and nano grains in a magnesium alloy severely deformed through accumulative back extrusion (ABE). The microstructure and texture obtained after applying multiple deformation passes at temperatures of 100 and 250°C were characterized. The results showed that after single ABE pass at 100°C an ultrafine/nano grained microstr...

2015
Riccardo Longo Chiara Marcolla Massimiliano Sala

Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose two multi-authority key-policy ABE systems. In our first proposal, the authorities may be set up in any moment and without any coordination. A p...

Journal: :Seeing and perceiving 2012
Massimo Grassi Clara Casco

The audiovisual bounce inducing effect (ABE) is a bouncing percept induced by the presentation of a sound in a motion display otherwise perceived as streaming. The literature suggests that the origin of the ABE is double: the effect stems from the action of an attentional component and that of a non-attentional component. However, the type of response classically gathered in ABE studies does n...

2013
Pooja K. Patil P. M. Pawar

Personal Health Record (PHR) is a web based set of tools that provides the facility to exchange and maintain a complete electronic health record of a patient. Third-party service providers are available to maintain PHRs like HealthVault1, Google Health or Web MD. These applications allow individuals to enter, store and share their own health data, upload health measurements from their devices o...

Journal: :Journal of Cystic Fibrosis 2023

Aim: W1282X is the sixth most common cystic fibrosis (CF)-causing variant and one of those without an approved therapy. Adenine base editing (ABE) has attracted interest as it can correct mutations creating a double-stranded break in DNA, being thus potentially safer than traditional approach with CRISPR/Cas9. Efficient correction by ABE been reported but bystander edits have observed at adjace...

2013
Min XIAO Shumei YUAN

Attributes based encryption (ABE) can achieve flexible and scalable access control and gurantee the confidentiality of the data stored in the cloud. However, important issues such as efficient user revocation and fine-grained access control are not straightforward, which constrain the adoption of ABE in cloud storage systems.Our proposed scheme realizes fine-grained read and write access contro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید