[PDF][PDF] Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey.

KP Kibiwott, F Zhang, K Kimeli Victor, AA Omala… - Int. J. Netw …, 2019 - ijns.jalaxy.com.tw
Mobile technology is proving to offer unprecedented advantage to health professionals by
providing a more efficient transmission and access to health services. However, mobile …

[PDF][PDF] An efficient and secure solution for attribute revocation problem utilizing CP-ABE scheme in mobile cloud computing

VH Kalmani, D Goyal, S Singla - International Journal of Computer …, 2015 - Citeseer
With the advent of business apps which allow users to form dynamic groups so that they can
store data on cloud servers and share the data within their user groups through their mobile …

Improved server assisted signatures

K Bicakci, N Baykal - Computer Networks, 2005 - Elsevier
It is well known that excessive computational demands of public key cryptography have
made its use limited especially when constrained devices are of concern. To reduce the …

Server-Supported Decryption for Mobile Devices

JM Kirss, P Laud, N Snetkov, J Vakarjuk - International Workshop on …, 2022 - Springer
We propose a threshold encryption scheme with two-party decryption, where one of the
keyshares may be stored and used in a device that is able to provide only weak security for …

Equipping smart devices with public key signatures

X Ding, D Mazzocchi, G Tsudik - ACM Transactions on Internet …, 2007 - dl.acm.org
One of the major recent trends in computing has been towards so-called smart devices, such
as PDAs, cell phones and sensors. Such devices tend to have a feature in common: limited …

WITHDRAWN: Empirical analysis of security enabled cloud computing strategy using attribute based encryption scheme

AB Aissa, AI Taloba, RM Abd-Aziz, IA Mohamed… - 2021 - Elsevier
Q23Withdrawal Notice WITHDRAWN: Empirical analysis of security enabled cloud
computing strategy using attribute based encryption schemeAnis Ben Aissa a, Ahmed I …

SIPmsign: a lightweight mobile signature service based on the Session Initiation Protocol

A Ruiz‐Martínez… - Software: Practice …, 2014 - Wiley Online Library
The development of mobile signatures could increase the spread and adoption of mobile
services based on electronic signatures, such as mobile payments, mobile business …

Security analysis of a server-aided RSA key generation protocol

T Cao, X Mao, D Lin - … Conference, ISPEC 2006, Hangzhou, China, April …, 2006 - Springer
Abstract Modadugu, Boneh and Kim proposed two RSA key generation protocols (MBK
Protocols) to generate the RSA keys efficiently on a low-power handheld device with the …

[图书][B] Security Framework for The Internet of Things Applications

SA Hamad, QZ Sheng, WE Zhang - 2024 - books.google.com
The text highlights a comprehensive survey that focuses on all security aspects and
challenges facing the Internet of Things systems, including outsourcing techniques for partial …

More efficient server assisted one time signatures

V Goyal - Cryptology ePrint Archive, 2004 - eprint.iacr.org
Server assisted one time signature scheme was recently presented as a non-repudiation
service for mobile and constrained devices. However, the scheme suffered with high storage …