Search Results - "attribute-based encryption algorithm"

Refine Results
  1. 1

    A secure and cloud-based patient management system using attribute-based encryption algorithm by Kalarani, Senthilkumar, Shobana, Mahalingam, Shankari, Edamakanti Uma, Praveena, Bolly Joshi, Shanthi, Subramaniam, Ramadevi, Rathinasabapathy, Sandiri, Rajendar

    ISSN: 2088-8708, 2722-2578
    Published: 01.04.2025
    “…Using attribute-based encryption (ABE), cloud-based patient management systems may be made more secure and efficient. The goal is to provide a scalable…”
    Get full text
    Journal Article
  2. 2

    Privacy-Aware Information Security for E-Learning Platforms in History Using Attribute-Based Encryption Algorithm by Muhiddinov, Muslihiddin

    ISSN: 2182-2069, 2182-2077
    Published: 28.02.2025
    “…The swift progression of technological advances has made Digital Instructional Resources (DIR) more critical in the history of E-Learning. Conventional access…”
    Get full text
    Journal Article
  3. 3

    An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud by Li, Hao, Deng, Lianbing, Yang, Cheng, Liu, Jianbo

    ISSN: 1550-1329, 1550-1477, 1550-1477
    Published: London, England SAGE Publications 01.02.2020
    “… To solve these problems, we propose an enhanced media ciphertext-policy attribute-based encryption algorithm and introduce its two key components, the multiple access tree and the key chain…”
    Get full text
    Journal Article
  4. 4

    Secure Login System using MD5 and AES Attribute Based Encryption Algorithm by Wakhare, Sailee, Pise, Dr Priya, Birajdar, Shivani, Khalate, Rutuja, Survase, Sonali

    ISSN: 2278-3075, 2278-3075
    Published: 30.06.2020
    “…The cryptographic hash work and symmetric encryption make it hard to break Passwords. Secure secret word stockpiling is a crucial perspective in framework…”
    Get full text
    Journal Article
  5. 5

    Blockchain orchestrated secure medical data transmission via attribute-based encryption by Mohan, M. Smitha, Sujihelen, L.

    ISSN: 2090-4479
    Published: Elsevier B.V 01.10.2025
    Published in Ain Shams Engineering Journal (01.10.2025)
    “…Electronic health records (EHRs) are crucial digital documents that contain patient medical information. Medical data sharing faces critical challenges,…”
    Get full text
    Journal Article
  6. 6

    Data Leakage Detection and Prevention Using Ciphertext-Policy Attribute Based Encryption Algorithm by V, Sasikala, P, Lakshmi Saipriya, P, Nagaraja Kumari, V, Lakshmi Padmaja, CH, Bhanu Sri

    ISSN: 2769-2884
    Published: IEEE 14.03.2024
    “… Utilization of Ciphertext-Policy Attribute-Based Encryption Algorithm has surfaced in a viable approach to safeguard data both during transmission and storage…”
    Get full text
    Conference Proceeding
  7. 7

    Towards Efficient and Secure Access Control System for Mobile Cloud Computing by Tu, Shanshan, Huang, Yongfeng

    ISSN: 1673-5447
    Published: China Institute of Communications 01.12.2015
    Published in China communications (01.12.2015)
    “…This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This…”
    Get full text
    Journal Article
  8. 8

    Improving security in a virtual network by using attribute based encryption algorithm by Krishnan, Ajeesh G., Wilson, Vinil

    Published: IEEE 01.03.2016
    “…The creation of a network for an organization or a firm can be a multifarious task especially if there a large number of nodes, middle-boxes and security nodes…”
    Get full text
    Conference Proceeding
  9. 9

    Comparison of Encryption Time for Multi-level Authentication in Cloud using Lightweight Cryptography Method over Chipper Text-PolicyAttribute Based Encryption Algorithm by Reddy, Peram Venkata Krishna Teja, Justin Thangaraj, S. John

    ISSN: 2473-7674
    Published: IEEE 24.06.2024
    “…In an attempt to reduce encryption time, we would want to compare the Chipper text-policy-attribute based encryption method with a new lightweight cryptography…”
    Get full text
    Conference Proceeding
  10. 10

    AI-Enabled Quality Control: Detecting Defects in Manufacturing Processes with Convolutional Neural Networks by S.Rajarajeswari, Prasadarao, J, Adnan, Myasar Mundher, Kaur, Simranjit, Vishwakarma, Ravi, Vinoth, R.

    ISSN: 2642-7354
    Published: IEEE 22.11.2024
    “…This paper aims to establish an improvement upon previous approaches to defect detection, namely, the CNN model and how it is more effective than edge…”
    Get full text
    Conference Proceeding
  11. 11

    Research on Identity Authentication Technology of Vehicle Networking Users Based on Commercial Password by Li, Yuning, Li, Kaitian, Dong, Changqing

    Published: IEEE 23.09.2024
    “…A solution anchored in commercial cryptography is proposed, tackling the identity authentication conundrum in the Internet of Vehicles (IoV) milieu. This paper…”
    Get full text
    Conference Proceeding
  12. 12

    A bio-inspired model to provide data security in cloud storage by Hitaswi, N., Chandrasekaran, K.

    Published: IEEE 01.10.2016
    “…The demand for cloud computing is increasing rapidly because of the advantages it provides to the customers like, pay as you use, self-serving, elastic,…”
    Get full text
    Conference Proceeding
  13. 13

    BDSS-FA: A Blockchain-Based Data Security Sharing Platform With Fine-Grained Access Control by Xu, Hong, He, Qian, Li, Xuecong, Jiang, Bingcheng, Qin, Kuangyu

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2020
    Published in IEEE access (2020)
    “… First, this paper proposes a new hierarchical attribute-based encryption algorithm, which uses hierarchical attribute structure and multi-level authorization center…”
    Get full text
    Journal Article
  14. 14

    Lightweight and fine‐grained access control for cloud–fog‐based electronic medical record sharing systems by Zhang, Aiqing, Wang, Xiao, Ye, Xinrong, Xie, Xiaojuan

    ISSN: 1074-5351, 1099-1131
    Published: Chichester Wiley Subscription Services, Inc 10.09.2021
    “…‐based encryption algorithm. Data owners encrypt the medical records with symmetric encryption and store them in cloud…”
    Get full text
    Journal Article
  15. 15

    Blockchain-based cloud storage system with CP-ABE-based access control and revocation process by Sharma, Pratima, Jindal, Rajni, Borah, Malaya Dutta

    ISSN: 0920-8542, 1573-0484
    Published: New York Springer US 01.04.2022
    Published in The Journal of supercomputing (01.04.2022)
    “… Therefore, we propose a blockchain-based framework with the Ciphertext Policy Attribute-based Encryption algorithm to provide access control and user revocation methods in the cloud storage system…”
    Get full text
    Journal Article
  16. 16

    Attribute-Based Secure Announcement Sharing Among Vehicles Using Blockchain by Ma, Jianfeng, Li, Tao, Cui, Jie, Ying, Zuobin, Cheng, Jiujun

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.07.2021
    Published in IEEE internet of things journal (01.07.2021)
    “… To solve this issue, we propose an attribute-based encryption algorithm using blockchain, which is maintained by a roadside unit (RSU…”
    Get full text
    Journal Article
  17. 17

    Data sharing platform and security mechanism based on cloud computing under the Internet of Things by Cai, Jie, Wang, Jun

    ISSN: 2299-1093, 2299-1093
    Published: De Gruyter 10.12.2022
    Published in Open computer science (10.12.2022)
    “… This article presented an attribute-based encryption (ABE) algorithm, a detailed interpretation of the attribute-based encryption algorithm, and analyzed security problems in data sharing in cloud computing…”
    Get full text
    Journal Article
  18. 18

    Blockchain-enabled data sharing for IoT: A lightweight, secure and searchable scheme by Xie, Qingqing, Zhu, Fatong, Feng, Xia

    ISSN: 1383-7621
    Published: Elsevier B.V 01.09.2024
    Published in Journal of systems architecture (01.09.2024)
    “… We design an outsourcing attribute-based encryption algorithm to alleviate the overhead of resource-limited IoT terminals, which reduces…”
    Get full text
    Journal Article
  19. 19

    SSPA-LBS: Scalable and Social-Friendly Privacy-Aware Location-Based Services by Ma, Changsha, Yan, Zhisheng, Chen, Chang Wen

    ISSN: 1520-9210, 1941-0077
    Published: Piscataway IEEE 01.08.2019
    Published in IEEE transactions on multimedia (01.08.2019)
    “…Privacy-aware location-based service (PA-LBS) preserves LBS users' privacy but undesirably sacrifices service quality. In order to balance the two factors with…”
    Get full text
    Journal Article
  20. 20

    ERSChain : Towards secure and flexible educational resource sharing using consortium blockchain and revocable ciphertext‐policy attribute‐based encryption by Zhao, Gang, He, Hui, Di, Bingbing, Wu, Tong

    ISSN: 1532-0626, 1532-0634
    Published: Hoboken Wiley Subscription Services, Inc 29.02.2024
    Published in Concurrency and computation (29.02.2024)
    “…Sharing high‐quality educational resources has become an effective way to promote educational equity. The traditional educational resource sharing platforms…”
    Get full text
    Journal Article