نتایج جستجو برای: abe

تعداد نتایج: 1907  

Journal: :Psychonomic bulletin & review 2015
Pietro Spataro Neil W Mulligan Clelia Rossi-Arnaud

The Attentional Boost Effect (ABE) refers to the counter-intuitive finding that the detection of infrequent targets in a divided-attention (DA) condition enhances memory of images co-occurring with targets (as compared with images co-occurring with distractors; Swallow & Jiang Cognition, 115, 118-132, 2010). Previous studies have shown that the ABE also applies to verbal materials (words; Spata...

Journal: :IACR Cryptology ePrint Archive 2016
Yacov Yacobi

Our new Access Control Encryption is an implementation of CP-ABE, when used as part of a key delivery mechanism for an encrypted Data Base. It focuses on improving performance. In ACE the access policies are any predicates over the set of object attributes. E¢ ciency gains are most pronounced when the DNF representations of policies are compact. In ACE, within the life span of the keys, each us...

Journal: :IACR Cryptology ePrint Archive 2016
Xiaoyi Li Kaitai Liang Zhen Liu Duncan S. Wong

A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows users to specify the access policies without having to know the identities of users. In this paper, we contribute by proposing an ABE scheme which enables revoking corrupted users. Given a key-like blackbox, our system can identify at least one of the users whose key must have been used to construct the blackbox and can revoke the k...

2011
Nam In Park Young Han Lee Hong Kook Kim

In this paper, an artificial bandwidth extension (ABE) algorithm from narrowband to wideband is proposed in order to improve the quality of narrowband speech. The proposed ABE algorithm is based on spectral band replication in the modified discrete cosine transform (MDCT) domain with no additional bits. In particular, the patch index search for the replication band is restricted so that the har...

2014
Gongping Liu Lin Gan Sainan Liu Haoli Zhou Wang Wei Wanqin Jin

Pervaporation (PV) has attracted increasing attention because of its potential application in bio-butanol recovery from fermentation process. In this work, PDMS/ceramic composite membrane was employed for PV separation of acetone–butanol–ethanol (ABE) aqueous solutions. The influence of coupling effect on the molecular transport during the PV process was systematically investigated. The separat...

Journal: :International journal of systematic bacteriology 1998
I Yumoto K Kawasaki H Iwata H Matsuyama H Okuyama

A psychrophilic bacterium, previously described as Vibrio sp. strain ABE-1T, has been reassigned by phenotypic characterization, chemotaxonomic analysis and 16S rRNA phylogenetic analysis. The organism was curved rods and it could reduce nitrate to nitrite and hydrolyse gelatin and DNA, but not chitin. NaCl was required for growth. This strain was susceptible to the vibriostatic compound O/129....

Journal: :The Journal of biological chemistry 2001
T Myles T H Yun S W Hall L L Leung

The interaction interface between human thrombin and human factor V (FV), necessary for complex formation and cleavage to generate factor Va, was investigated using a site-directed mutagenesis strategy. Fifty-three recombinant thrombins, with a total of 78 solvent-exposed basic and polar residues substituted with alanine, were used in a two-stage clotting assay with human FV. Seventeen mutants ...

Journal: :IACR Cryptology ePrint Archive 2017
Chun-I Fan Yi-Fan Tseng Chih-Wen Lin

Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides. If the attributes of the receivers match the access policy, then they can decrypt the ciphertext. This manuscript shows a relation between ABE and identity-based en...

Journal: :IACR Cryptology ePrint Archive 2014
Riccardo Longo Chiara Marcolla Massimiliano Sala

Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose two multi-authority key-policy ABE systems. In our first proposal, the authorities may be set up in any moment and without any coordination. A p...

2016
Hikaru Tsuchida Takashi Nishide Eiji Okamoto Kwangjo Kim

Attribute-Based Encryption (ABE) is regarded as one of the most desirable cryptosystems realizing data security in the cloud storage systems. Functional Encryption (FE) which includes ABE and the ABE system with multiple authorities are studied actively today. However, ABE has the attribute revocation problem. In this paper, we propose a new revocation scheme using update information, i.e., rev...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید