Search Results - "Attribute-based encryption algorithm"
-
1
Blockchain orchestrated secure medical data transmission via attribute-based encryption
ISSN: 2090-4479Published: Elsevier B.V 01.10.2025Published in Ain Shams Engineering Journal (01.10.2025)“…Electronic health records (EHRs) are crucial digital documents that contain patient medical information. Medical data sharing faces critical challenges,…”
Get full text
Journal Article -
2
Towards Efficient and Secure Access Control System for Mobile Cloud Computing
ISSN: 1673-5447Published: China Institute of Communications 01.12.2015Published in China communications (01.12.2015)“…This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This…”
Get full text
Journal Article -
3
Comparison of Encryption Time for Multi-level Authentication in Cloud using Lightweight Cryptography Method over Chipper Text-PolicyAttribute Based Encryption Algorithm
ISSN: 2473-7674Published: IEEE 24.06.2024Published in International Conference on Computing, Communication, and Networking Technologies (Online) (24.06.2024)“…In an attempt to reduce encryption time, we would want to compare the Chipper text-policy-attribute based encryption method with a new lightweight cryptography…”
Get full text
Conference Proceeding -
4
AI-Enabled Quality Control: Detecting Defects in Manufacturing Processes with Convolutional Neural Networks
ISSN: 2642-7354Published: IEEE 22.11.2024Published in International Conference on Computing, Communication and Automation (Online) (22.11.2024)“…This paper aims to establish an improvement upon previous approaches to defect detection, namely, the CNN model and how it is more effective than edge…”
Get full text
Conference Proceeding -
5
Research on Identity Authentication Technology of Vehicle Networking Users Based on Commercial Password
Published: IEEE 23.09.2024Published in 2024 International Conference on Electronics and Devices, Computational Science (ICEDCS) (23.09.2024)“…A solution anchored in commercial cryptography is proposed, tackling the identity authentication conundrum in the Internet of Vehicles (IoV) milieu. This paper…”
Get full text
Conference Proceeding -
6
A bio-inspired model to provide data security in cloud storage
Published: IEEE 01.10.2016Published in 2016 International Conference on Information Technology (InCITe) - The Next Generation IT Summit on the Theme - Internet of Things: Connect your Worlds (01.10.2016)“…The demand for cloud computing is increasing rapidly because of the advantages it provides to the customers like, pay as you use, self-serving, elastic,…”
Get full text
Conference Proceeding -
7
Improving security in a virtual network by using attribute based encryption algorithm
Published: IEEE 01.03.2016Published in 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) (01.03.2016)“…The creation of a network for an organization or a firm can be a multifarious task especially if there a large number of nodes, middle-boxes and security nodes…”
Get full text
Conference Proceeding