The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the cloud, data is often shared by a group of users. To ensure the long-term correctness of cloud shared data, a third-party public verifier can be introduced to audit data integrity. During the auditing, protecting the privacy of the contributors of shared data from the public auditor is a fundamental issue. However, this makes it challenging to simultaneously support group membership dynamics...
With the current rapid increase of cloud computing, enterprises outsource their sensitive data for sharing in a cloud. The key problems of this approach include establishing access control for the encrypted data, and revoking the access rights from users when they are no longer authorized to access the encrypted data on cloud servers. This paper aims to solve these problems. Firstly, based on the...
Wireless networks with the multi-level secure group communication suit unmanned aircrafts. Based on the different security domain of wireless environments, an efficient finely granular multi-level security solution of wireless Mesh network is proposed, which consists of a three-party security information exchange protocol for the data transmission between nodes in the wireless network and an ID-based...
In this paper, we have proposed a novel encryption scheme with chaotic process based on Enigma. The encryption scheme takes the advantage of the approximate non-linear mechanism of original Enigma, with the chaos controlling the encryption process. It has strengthened the randomness of plaintext replacement and improved the security of the encryption scheme. The results of encrypting images and letters...
Signature, encryption and key exchange are some of the most important and foundational cryptographical tool. In most cases, they are all needed to provide different secure functions. There exist called authenticated encryption scheme and signcryption schemes that is the integration of signature and encryption. On the other hand, there are also some proposals on the efficient combination of signature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.