نتایج جستجو برای: modiriat abe shahri

تعداد نتایج: 1929  

Journal: :Inf. Sci. 2014
Hua Deng Qianhong Wu Bo Qin Josep Domingo-Ferrer Lei Zhang Jianwei Liu Wenchang Shi

Attribute-based encryption (ABE) systems allow encrypting to uncertain receivers by means of an access policy specifying the attributes that the intended receivers should possess. ABE promises to deliver fine-grained access control of encrypted data. However, when data are encrypted using an ABE scheme, key management is difficult if there is a large number of users from various backgrounds. In...

Journal: :Ceskoslovenska patologie 2005
M Zámecník A Skrivánek

A case of adenoid basal epithelioma (ABE) of the uterine cervix in 21-year-old woman is reported. The patient's age appears to be lowest among cases of ABE reported to date. The tumor showed typical histologic features of ABE and was associated with CIN3. In addition, rare tumor cells had surface cilia-appearing structures suggesting tubal differentiation. Immunohistochemically, the tumor was r...

2010
Achim D. Brucker Helmut Petritsch Stefan G. Weber

Attribute-based Encryption (ABE) allows for implementing fine-grained decentralized access control based on properties or attributes a user has. Thus, there is no need for writing detailed, user-based policies in advance. This makes ABE in particular interesting for implementing security mechanisms in dynamic environments such as ubiquitous computing, disaster management, or health-care. For su...

2006
Hannu Pulakka Laura Laaksonen Paavo Alku

Quality and intelligibility of narrowband telephone speech can be improved by artificial bandwidth expansion (ABE), which expands the speech bandwidth using only information available in the narrowband speech signal. This paper describes an ABE method that generates a high-band expansion using spectral folding and then modifies the magnitude spectrum of the expansion band with spline curves. Th...

Journal: :CoRR 2016
Federico Giacon Riccardo Aragona Massimiliano Sala

A revocable-storage attribute-based encryption (RS-ABE) scheme is an encryption scheme which extends attribute-based encryption by introducing user revocation. A key-policy RS-ABE scheme links each key to an access structure. We propose a new key-policy RS-ABE scheme whose security we prove in term of indistinguishability under a chosen-plaintext attack (IND-CPA).

Journal: :IACR Cryptology ePrint Archive 2014
Jinguang Han Willy Susilo Yi Mu Jianying Zhou Man Ho Au

Cipher-policy attribute-based encryption (CP-ABE) is a more efficient and flexible encryption system as the encryptor can control the access structure when encrypting a message. In this paper, we propose a privacy-preserving decentralized CP-ABE (PPDCP-ABE) scheme where the central authority is not required, namely each authority can work independently without the cooperation to initialize the ...

Journal: :Bioresource technology 2008
Nasib Qureshi Thaddeus C Ezeji Jennifer Ebener Bruce S Dien Michael A Cotta Hans P Blaschek

Fermentation of sulfuric acid treated corn fiber hydrolysate (SACFH) inhibited cell growth and butanol production (1.7+/-0.2g/L acetone butanol ethanol or ABE) by Clostridium beijerinckii BA101. Treatment of SACFH with XAD-4 resin removed some of the inhibitors resulting in the production of 9.3+/-0.5 g/L ABE and a yield of 0.39+/-0.015. Fermentation of enzyme treated corn fiber hydrolysate (ET...

Journal: :Molecules 2014
Ju-Young Kim Sun-Hyang Park Hyun Mee Oh Sung Chul Kwak Jong Min Baek Myeung Su Lee Mun Chual Rho Jaemin Oh

Osteoclasts play a critical role in bone resorbing disorders such as osteoporosis, periodontitis, and rheumatoid arthritis. Therefore, discovery of agents capable of suppressing osteoclast differentiation may aid the development of a therapeutic access for the treatment of pathological bone loss. Ampelopsis brevipedunculata has been used as herbal folk medicine to treat liver diseases and infla...

2013
Nishant Doshi Devesh C Jinwala

Ciphertext policy attribute based encryption (CP-ABE) is a technique in which a user with a secret key (containing attributes) is able to decrypt a message only if the attributes in the policy match those defined in the secret key. The existing methods that use reasonably computable decryption policies for CP-ABE, produce the ciphertext of size at least linearly varying with the number of attri...

2015
Pratibha Mishra

In military environments, like battlefield or a hostile region, the mobile nodes might suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technology is the successful solution that allow, wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external stor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید