نتایج جستجو برای: modiriat abe shahri
تعداد نتایج: 1929 فیلتر نتایج به سال:
In this paper, we present two fully secure functional encryption schemes. Our first resultis a fully secure attribute-based encryption (ABE) scheme. Previous constructions of ABEwere only proven to be selectively secure. We achieve full security by adapting the dualsystem encryption methodology recently introduced by Waters and previously leveraged toobtain fully secure IBE ...
As more sensitive data is shared and stored by third-party sites on the internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level. Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promisin...
Palmitoylation is a post-translational lipid modification involving the attachment of a 16-carbon saturated fatty acid, palmitate, to cysteine residues of substrate proteins through a labile thioester bond [reviewed in]. Palmitoylation of a substrate protein increases its hydrophobicity, and typically facilitates its trafficking toward cellular membranes. Recent studies have shown palmitoylatio...
Attribute-based encryption (ABE) is a technique used to encrypt data, it has the flexibility of access control, high security, and resistance collusion attacks, especially in cloud security protection. However, large number bilinear mappings are ABE, calculation pairing time-consuming. So there problem low efficiency. On other hand, decryption key not uniquely associated with personal identific...
1. Kanitakis J, Lora V. Pagetoid dyskeratosis: A frequent pitfall in dermatopathology. Eur J Dermatol. 2010;20:123--4. 2. Toyonaga E, Inokuma D, Abe Y, Abe R, Shimizu H. Pagetoid dyskeratosis with parallel ridge pattern under dermoscopy. JAMA Dermatol. 2013;149:109--11. 3. Frenk E, Delacrétraz J. Hydropic degeneration of epidermal keratinocytes. An alteration leading to patchy hyperpigmentation...
In this paper, we propose a notion of flexible attribute-based encryption. Flexible attribute-based encryption is a variant of ciphertextpolicy ABE, which allows one to loosen a decryption policy underlying a given ciphertext, if one knows some system-wide trapdoor information, without knowing its underlying plaintext message. We give a concrete construction of the flexible attribute-based encr...
For several years we have been conducting Accuracy Based Evaluations (ABE) of the JANUS speech-to-speech MT system (Gates et al., 1997) which measure quality and fidelity of translation. Recently we have begun to design a Task Based Evaluation for JANUS (Thomas, 1999) which measures goal completion. This paper describes what we have learned by comparing the two types of evaluation. Both evaluat...
In this work, we provide the first construction of Attribute-Based Encryption (ABE) for general circuits. Our construction is based on the existence of multilinear maps. We prove selective security of our scheme in the standard model under the natural multilinear generalization of the BDDH assumption. Our scheme achieves both Key-Policy and Ciphertext-Policy variants of ABE. Our scheme and its ...
Most of the existing ways for strengthening users’ confidence in uploading private data to a cloud platform stress too much on security. On the contrary, cloud computing must be open and distributed. Moreover, it should provide highly robust, secure, and quality services to users. Therefore, establishing a balance between the performance and the security of cloud platforms is necessary. In this...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید