نتایج جستجو برای: attribute based encryption

تعداد نتایج: 2993376  

2017
Gabriela Mogos

Attribute-Based Encryption is a relatively new concept in the field of cryptography, and it allows only the authorized entities to decrypt a message. This type of encryption is the mechanism by which the users may encrypt and decrypt data based on user attributes. This paper proposes the first quantum alternative of the scheme Key-Policy Attribute Based Encryption, where the information, the en...

2015
D. G. Harkut

The data security concerns and requirements are very essential for social networks or for cloud computing where individuals, organizations, and businesses may outsource their various types of data, including highly sensitive data into the cloud. Always people would like to make their sensitive or private data only accessible to authorized people having some access policies. So in order to share...

2016

With the growing status of cloud computing, firms and data owners begins to outsource their primary data to the general public cloud for decreased management price and ease of access. Encryption helps to shield user data confidentiality, it makes tricky to perform the comfy undeniable textual content search over the encrypted data Attribute-Based Encryption (ABE) is a shows potential cryptograp...

2008
Gaywalee Yamskulna

In this paper we prove that the vertex algebra V + L is rational if L is a negative definite even lattice of finite rank , or if L is a non-degenerate even lattice of a finite rank that is neither positive definite nor negative definite. In particular, for such even lattices L, we show that the Zhu algebras of the vertex algebras V + L are semisimple. This extends the result of Abe from [A2] wh...

2015
G. Sreeram G. S. Anandhamala G. V. Uma

Article history: Received 16 April 2015 Accepted 12 June 2015 Available online 1 July 2015

1988
Itzhak Gilboa

A model of information is presented, in which statements such as "the information sets are common knowledge" may be formally stated and proved. The model can aiso abe extended to include the statement: "this model is common knowledge" in a well-defined manner, using the fact that when an event A is common knowledge, it is common knowJedge that A is common knowledge. Finally, the model may also ...

2002
NOBUAKI ONISHI

Matsuki and Wentworth [M-W] constructed the moduli space of w-twisted semi-stable sheaves E with v(E) = v. We denote it by M w H(v). If w = v(OX), then the v(OX)-twisted semi-stability is nothing but the usual Gieseker’s semi-stability. Hence we denote M v(OX) H (v) by MH(v). Assume that v is an isotropic Mukai vector. In [A], Abe considered the singularities of MH(v). Replacing MH(v) by M v H(...

2002
NOBUAKI ONISHI

Matsuki and Wentworth [M-W] constructed the moduli space of w-twisted semi-stable sheaves E with v(E) = v. We denote it by M w H(v). If w = v(OX), then v(OX)-twisted semi-stability is nothing but the usual Gieseker’s semi-stability. Hence we denote M v(OX) H (v) by MH(v). Assume that v is an isotropic Mukai vector. In [A], Abe considered the singularities of MH(v). Replacing MH(v) by M v H(v), ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید