Blockchain-based digital rights management scheme via multiauthority ciphertext-policy attribute-based encryption and proxy re-encryption

J Gao, H Yu, X Zhu, X Li - IEEE systems journal, 2021 - ieeexplore.ieee.org
In order to ensure the confidentiality of digital contents, improve the fairness of digital
copyright transactions, and reduce the time and management overhead of digital copyright …

Enhanced WPA2/PSK for preventing authentication cracking

CL Chen, S Punya - Mobile Wireless Middleware, Operating Systems and …, 2020 - Springer
With the popularization of mobile phones and Wi-Fi hotspots, the diversification of wireless
communication applications has rapidly growing. Wi-Fi Protected Access (WPA), offered by …

Achieving secure and convenient WLAN sharing in personal

Z Yan, C Yang, W You, J Guo, J Zhang… - IET Information …, 2020 - Wiley Online Library
The authors analyse the security threats caused by personal wireless local area network
(WLAN) sharing, propose schemes under two different conditions, and evaluate the …

Performance evaluation of Wireless Network Standards using Net Sim.

ALIFALI SAWEHLI, KC ARUN - International Journal of …, 2019 - search.ebscohost.com
In this contemporary world, computer network has become one of the major requirements in
today's world. It can be seen in various places such as home, universities, hospitals, airports …

[PDF][PDF] Методика защиты данных в системах граничных вычислений на основе атрибутивного шифрования

КЮ Пономарев, АА Захаров - Печатается по решению совета …, 2018 - researchgate.net
Граничными вычислениями (англ. Edge computing) называется вид архитектур
информационных систем, в которых обработка и хранение информации частично …