The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As an emerging patient-centric model of health information exchange, personal health record (PHR) is often outsourced to be stored at a third party. The value of PHR data is its long-term cumulative record relevant with personal health which can be significant in the future when faced with disease occurrences. As a promising public key primitive, attribute-based encryption (ABE) has been used to design...
Certificate-based signature preserves advantages of implicit certification and no private key escrow as the certificate-based encryption scheme presented at Euro crypt 2003 by Gentry. In this paper, we present a certificate-based signature scheme derived from bilinear pairings and prove its security in the random oracle model. The scheme is secure based on the traditional difficult problem defined...
Plagiarism detection technology plays a very important role in copyright protection of computer software. The plagiarism technology mainly includes text-based, token-based and syntax-based technologies. This paper will introduce a technique based on the Abstract Syntax Tree (AST). This algorithm based on AST can effectively detects the plagiarism cases of changing the names of methods and variables...
The paradigm of proxy signature is one of important digital signatures. In a proxy signature scheme, it allows an entity to delegate signing capabilities to other participants so that they can sign on behalf of the entity. Proxy signatures are useful to design cryptographic protocols, however, there are only few provable secure proxy signature schemes. In this paper, we propose a new provably secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.