Showing 441 - 460 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 441
  2. 442
  3. 443
  4. 444
  5. 445

    A Secure and Fair Joint E-Lottery Protocol by Chin-Ling Chen, Yuan-Hao Liao, Woei-Jiunn Tsaur

    Published 2014-01-01
    “…In this paper, we use the multisignature and verifiable random function to construct a secure and fair joint e-lottery scheme. The players can check the lottery integrity, and the winning numbers can be verified publicly.…”
    Get full text
    Article
  6. 446

    Security sharing scheme for encrypted data in cloud storage by Wen-bin YAO, Si HAN, Xiao-yong LI

    Published 2015-10-01
    “…With the convenient of storing and sharing data in cloud storage environment,the concerns about data security arised as well.To achieve data security on untrusted servers,user usually stored the encrypted data on the cloud storage environment.How to build a cipertext-based access control scheme became a pot issue.For the access control problems of ciphertext in cloud storage environment,a CP-ABE based data sharing scheme was proposed.Novel key generation and distribution strategies were proposed to reduce the reliance on a trusted third party.Personal information was added in decryption key to resistant conclusion attacks at the same time.Moreover,key revocation scheme was proposed to provide the data backward secrecy.The security and implement analysis proves that proposed scheme is suit for the real application environment.…”
    Get full text
    Article
  7. 447
  8. 448
  9. 449
  10. 450
  11. 451
  12. 452
  13. 453
  14. 454
  15. 455
  16. 456
  17. 457
  18. 458

    Security of the deployment of SDN-based IoT using blockchain by Ping XIE, Xiaosong LIU

    Published 2020-12-01
    Subjects: “…network security…”
    Get full text
    Article
  19. 459
  20. 460