• No results found

Software implementation of an Attribute-Based Encryption scheme

N/A
N/A
Protected

Academic year: 2020

Share "Software implementation of an Attribute-Based Encryption scheme"

Copied!
35
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

ABETABLE I PROTOCOL OPERATION COUNT WITH v ATTRIBUTES. K STANDS FOR KNOWN POINT/ELEMENT USING THE SIGNED

References

Related documents

The Fourier transformed infrared (FTIR) spectra of the Na 2 SO 4 –NaPO 3 glass revealed the formation of sep- arate sulfur–oxygen network in the sulfate groups, which are unbound

framework of the thesis, were published: “ High prevalence and diversity of species D AdV (HAdV D) in human populations of four Sub-Saharan countries. 2014), “ Adenovirus in Rural

Since quasigroups in general do not have algebraic properties such as associativity, commutativity, neutral elements, inverting these functions seems to require exponentially

In this paper, a novel configuration of double ridged horn antenna including a five layers polarizer at the horn aperture is proposed providing wideband and dual

Methods: Of 124 patients with HCV-infected liver diseases treated with IFN therapy in our hospital, 14 (mean age 56.00 ± 12.94 years) who attended to receive administration of IFN

The dividend payers tend to follow the free cash flow theory as indicate by size, return on assets, retained earnings to total assets, debt to assets ratio price to book

We present a machine-learning approach using freely available software for analysing imperfect reconstructions to be used in place of the more traditional thresholding based

(2005) study dynamic coherent risk measures (for the case of random variables on finite probability space and discrete time) and introduce the notion of (strong) time consistency;