نتایج جستجو برای: modiriat abe shahri

تعداد نتایج: 1929  

Journal: :Arquivos Brasileiros de Endocrinologia & Metabologia 2007

Journal: :IACR Cryptology ePrint Archive 2010
Allison Bishop Tatsuaki Okamoto Amit Sahai Katsuyuki Takashima Brent Waters

In this paper, we present two fully secure functional encryption schemes. Our first resultis a fully secure attribute-based encryption (ABE) scheme. Previous constructions of ABEwere only proven to be selectively secure. We achieve full security by adapting the dualsystem encryption methodology recently introduced by Waters and previously leveraged toobtain fully secure IBE ...

Journal: :CoRR 2014
Charan Kumar Dinesh Kumar Arun Kumar Reddy

As more sensitive data is shared and stored by third-party sites on the internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level. Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promisin...

2013
G. Stefano Brigidi Shernaz X Bamji

Palmitoylation is a post-translational lipid modification involving the attachment of a 16-carbon saturated fatty acid, palmitate, to cysteine residues of substrate proteins through a labile thioester bond [reviewed in]. Palmitoylation of a substrate protein increases its hydrophobicity, and typically facilitates its trafficking toward cellular membranes. Recent studies have shown palmitoylatio...

Journal: :Computers, materials & continua 2023

Attribute-based encryption (ABE) is a technique used to encrypt data, it has the flexibility of access control, high security, and resistance collusion attacks, especially in cloud security protection. However, large number bilinear mappings are ABE, calculation pairing time-consuming. So there problem low efficiency. On other hand, decryption key not uniquely associated with personal identific...

Journal: :Actas dermo-sifiliograficas 2014
A Plana Pla I Bielsa Marsol M Fernández-Figueras C Ferrándiz Foraster

1. Kanitakis J, Lora V. Pagetoid dyskeratosis: A frequent pitfall in dermatopathology. Eur J Dermatol. 2010;20:123--4. 2. Toyonaga E, Inokuma D, Abe Y, Abe R, Shimizu H. Pagetoid dyskeratosis with parallel ridge pattern under dermoscopy. JAMA Dermatol. 2013;149:109--11. 3. Frenk E, Delacrétraz J. Hydropic degeneration of epidermal keratinocytes. An alteration leading to patchy hyperpigmentation...

2012
Seiko Arita

In this paper, we propose a notion of flexible attribute-based encryption. Flexible attribute-based encryption is a variant of ciphertextpolicy ABE, which allows one to loosen a decryption policy underlying a given ciphertext, if one knows some system-wide trapdoor information, without knowing its underlying plaintext message. We give a concrete construction of the flexible attribute-based encr...

2000
Lori S. Levin Boris Bartlog Ariadna Font Llitjós Donna Gates Alon Lavie Dorcas Wallace Taro Watanabe Monika Woszczyna

For several years we have been conducting Accuracy Based Evaluations (ABE) of the JANUS speech-to-speech MT system (Gates et al., 1997) which measure quality and fidelity of translation. Recently we have begun to design a Task Based Evaluation for JANUS (Thomas, 1999) which measures goal completion. This paper describes what we have learned by comparing the two types of evaluation. Both evaluat...

Journal: :IACR Cryptology ePrint Archive 2012
Sanjam Garg Craig Gentry Shai Halevi Amit Sahai Brent Waters

In this work, we provide the first construction of Attribute-Based Encryption (ABE) for general circuits. Our construction is based on the existence of multilinear maps. We prove selective security of our scheme in the standard model under the natural multilinear generalization of the BDDH assumption. Our scheme achieves both Key-Policy and Ciphertext-Policy variants of ABE. Our scheme and its ...

Journal: :JSW 2014
Yi-mu Ji Jie Tan Hai Liu Yan-peng Sun Jia-bang Kang Zizhuo Kuang Chuanxin Zhao

Most of the existing ways for strengthening users’ confidence in uploading private data to a cloud platform stress too much on security. On the contrary, cloud computing must be open and distributed. Moreover, it should provide highly robust, secure, and quality services to users. Therefore, establishing a balance between the performance and the security of cloud platforms is necessary. In this...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید