A review on the state-of-the-art privacy-preserving approaches in the e-health clouds
A Abbas, SU Khan - IEEE journal of Biomedical and health …, 2014 - ieeexplore.ieee.org
Cloud computing is emerging as a new computing paradigm in the healthcare sector
besides other business domains. Large numbers of health organizations have started …
besides other business domains. Large numbers of health organizations have started …
Post-quantum asynchronous deniable key exchange and the signal handshake
The key exchange protocol that establishes initial shared secrets in the handshake of the
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …
Signal end-to-end encrypted messaging protocol has several important characteristics:(1) it …
The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks
Multiparty signature protocols need protection against rogue-key attacks, made possible
whenever an adversary can choose its public key (s) arbitrarily. For many schemes …
whenever an adversary can choose its public key (s) arbitrarily. For many schemes …
[HTML][HTML] Privacy-preserving authentication scheme based on zero trust architecture
F Tang, C Ma, K Cheng - Digital Communications and Networks, 2024 - Elsevier
Zero trust architecture is an end-to-end approach for server resources and data security
which contains identity authentication, access control, dynamic evaluation, and so on. This …
which contains identity authentication, access control, dynamic evaluation, and so on. This …
Image recognition with deep learning
Image recognition is one of the most important fields of image processing and computer
vision. Food image classification is an unique branch of image recognition problem. In …
vision. Food image classification is an unique branch of image recognition problem. In …
Designated verifier signature schemes: Attacks, new security notions and a new construction
We show that the signer can abuse the disavowal protocol in the Jakobsson-Sako-
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …
Impagliazzo designated-verifier signature scheme. In addition, we identify a new security …
Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map
Abstract The concept of Designated Verifier Signatures (DVS) was introduced by Jakobsson,
Sako and Impagliazzo at Eurocrypt'96. These signatures are intended to a specific verifier …
Sako and Impagliazzo at Eurocrypt'96. These signatures are intended to a specific verifier …
An efficient authentication scheme for intra-vehicular controller area network
Communication in modern cars is managed by a controller area network (CAN) bus protocol
and its extensions for electronic control units (ECUs). The CAN bus is a preferred method for …
and its extensions for electronic control units (ECUs). The CAN bus is a preferred method for …
Efficient blockchain-based electronic medical record sharing with anti-malicious propagation
Electronic Medical Records (EMRs) sharing enhances healthcare and biomedical
discoveries but faces challenges: data provider centralization and limited interoperability …
discoveries but faces challenges: data provider centralization and limited interoperability …
Chameleon hashing without key exposure
Chameleon signatures are based on well established hash-and-sign paradigm, where a
chameleon hash function is used to compute the cryptographic message digest. Chameleon …
chameleon hash function is used to compute the cryptographic message digest. Chameleon …