نتایج جستجو برای: modiriat abe shahri

تعداد نتایج: 1929  

Journal: :Neuropsychologia 2012
Marcello Maniglia Massimo Grassi Clara Casco Gianluca Campana

The audiovisual bounce inducing effect (ABE) is a bouncing percept induced by the presence of a sound at the moment of two moving objects intercepting in a motion display otherwise perceived as streaming. The origin of the ABE is still debated: the effect could arise from the subtraction of attentional resources caused by the sound (needed to favor the perception of streaming), and/or from the ...

2014
Hannu Pulakka Anssi Rämö Ville Myllylä Henri Toukomaa Paavo Alku

Artificial bandwidth extension (ABE) methods have been developed to improve the quality and intelligibility of telephone speech. In many previous studies, however, the evaluation of ABE has not fully reflected the use of ABE in mobile communication (e.g., evaluation with clean speech without coding). In this study, the subjective quality of ABE was evaluated with absolute category rating (ACR) ...

Journal: :J. UCS 2013
Xingxing Xie Hua Ma Jin Li Xiaofeng Chen

Attribute-Based Encryption (ABE) is one of the new visions for finegrained access control in cloud computing. Plenty of research work has been done in both academic and industrial communities. However, before ABE can be deployed in data outsourcing systems, efficient enforcement of authorization policies and policy updates are the main obstacles. Therefore, in order to solve this problem, effic...

Journal: :IACR Cryptology ePrint Archive 2009
Jin Li Kui Ren Bo Zhu Zhiguo Wan

As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the purpose of secure access control, there is, however, still one critical functionality missing in th...

2012
Hannu Pulakka

Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Hannu Pulakka Name of the doctoral dissertation Development and evaluation of artificial bandwidth extension methods for narrowband telephone speech Publisher School of Electrical Engineering Unit Department of Signal Processing and Acoustics Series Aalto University publication series DOCTORAL DISSERTATIONS 5/2013 Field of res...

Journal: :IACR Cryptology ePrint Archive 2017
Nuttapong Attrapadung

We propose a new generic framework for constructing fully secure attribute based encryption (ABE) in multilinear settings. It is applicable in a generic manner to any predicates. Previous generic frameworks of this kind are given only in bilinear group settings, where applicable predicate classes are limited. Our framework provides an abstraction of dual system paradigms over composite-order gr...

2014
Jyoti Yogesh Deshmukh Arati M. Dixit

The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-key infrastructures. ABE is also a useful building block in various cryptographic primitives such as searchable encryption. For ABE, it is not realistic to trust a single authority to monitor all attributes and hence distributing control over many attribute-authorities is desirable. A multi-author...

2016
Rahul Vora Priyanka Raval Kunjal Garala

In today’s digital world Cloud computing is a revolution knowledge for stream of computing as a utility. That is providing platform and services for enormous-scale of data storage and data manage. Big Data on cloud environment analyze, storage, manage, visualization, security are some challenges that requires more timing and large computation infrastructure processing. Security in terms of data...

Journal: :SpringerPlus 2016
Hanshu Hong Zhixin Sun

Attribute based encryption (ABE) has been widely applied for secure data protection in various data sharing systems. However, the efficiency of existing ABE schemes is not high enough since running encrypt and decrypt algorithms need frequent bilinear pairing operations, which may occupy too much computing resources on terminal devices. What's more, since different users may share the same attr...

H. Nasiraee M. Ashouri-Talouki,

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید