The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When we step into the new internet era, large numbers of new techniques have emerged in order to make our life better. However, these new techniques require some new properties in order to keep personal information confidentially which the traditional encryption method cannot catch up with. Recently, a new encryption primitive called Attribute Based Encryption(ABE) have appeared because it can achieve...
Attribute based signature scheme is an important cryptographic primitive which provides a powerful way for users to control their privacy. Due Attribute based signature scheme is an important cryptographic primitive which provides a powerful way for users to control their privacy. Due to the fact that it can reduce the bandwidth needed to transmit attribute based signatures and the time needed to...
Attribute based signature scheme is an important cryptographic primitive providing a powerful way for user to control their privacy. In wireless environment, the capacity of wireless channel is valuable resources which is limited. More information can be transmitted through the wireless channel when the cost of using signature to verify the message become less. In order to reduce the bandwidth needed...
In the cipher text-policy attribute based encryption scheme, the private key hold by user is associated with a set of attributes while the data is encrypted with an access structure defined by the data provider. In the most proposed schemes, the characteristics of attributes are treated in the identical level. In the real circumstance, the importance of each attributes is always different. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.