Search Results - "Attribute-based encryption algorithm"

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Blockchain orchestrated secure medical data transmission via attribute-based encryption by Mohan, M. Smitha, Sujihelen, L.

    ISSN: 2090-4479
    Published: Elsevier B.V 01.10.2025
    Published in Ain Shams Engineering Journal (01.10.2025)
    “…Electronic health records (EHRs) are crucial digital documents that contain patient medical information. Medical data sharing faces critical challenges,…”
    Get full text
    Journal Article
  2. 2

    Towards Efficient and Secure Access Control System for Mobile Cloud Computing by Tu, Shanshan, Huang, Yongfeng

    ISSN: 1673-5447
    Published: China Institute of Communications 01.12.2015
    Published in China communications (01.12.2015)
    “…This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This…”
    Get full text
    Journal Article
  3. 3

    Comparison of Encryption Time for Multi-level Authentication in Cloud using Lightweight Cryptography Method over Chipper Text-PolicyAttribute Based Encryption Algorithm by Reddy, Peram Venkata Krishna Teja, Justin Thangaraj, S. John

    ISSN: 2473-7674
    Published: IEEE 24.06.2024
    “…In an attempt to reduce encryption time, we would want to compare the Chipper text-policy-attribute based encryption method with a new lightweight cryptography…”
    Get full text
    Conference Proceeding
  4. 4

    AI-Enabled Quality Control: Detecting Defects in Manufacturing Processes with Convolutional Neural Networks by S.Rajarajeswari, Prasadarao, J, Adnan, Myasar Mundher, Kaur, Simranjit, Vishwakarma, Ravi, Vinoth, R.

    ISSN: 2642-7354
    Published: IEEE 22.11.2024
    “…This paper aims to establish an improvement upon previous approaches to defect detection, namely, the CNN model and how it is more effective than edge…”
    Get full text
    Conference Proceeding
  5. 5

    Research on Identity Authentication Technology of Vehicle Networking Users Based on Commercial Password by Li, Yuning, Li, Kaitian, Dong, Changqing

    Published: IEEE 23.09.2024
    “…A solution anchored in commercial cryptography is proposed, tackling the identity authentication conundrum in the Internet of Vehicles (IoV) milieu. This paper…”
    Get full text
    Conference Proceeding
  6. 6

    A bio-inspired model to provide data security in cloud storage by Hitaswi, N., Chandrasekaran, K.

    Published: IEEE 01.10.2016
    “…The demand for cloud computing is increasing rapidly because of the advantages it provides to the customers like, pay as you use, self-serving, elastic,…”
    Get full text
    Conference Proceeding
  7. 7

    Improving security in a virtual network by using attribute based encryption algorithm by Krishnan, Ajeesh G., Wilson, Vinil

    Published: IEEE 01.03.2016
    “…The creation of a network for an organization or a firm can be a multifarious task especially if there a large number of nodes, middle-boxes and security nodes…”
    Get full text
    Conference Proceeding