We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Receiver selective opening security for identity-based encryption in the multi-challenge setting

    Receiver selective opening (RSO) security requires that in a situation where there are one sender and multiple receivers, even if an adversary has...

    Zhengan Huang, Junzuo Lai, ... **n Mu in Designs, Codes and Cryptography
    Article 17 November 2022
  2. Digital Identity Infrastructures: a Critical Approach of Self-Sovereign Identity

    The shift from electronic identification to digital identity is indicative of a broader evolution towards datafication of identity at large. As...

    Alexandra Giannopoulou in Digital Society
    Article Open access 11 May 2023
  3. MMUIL: enhancing multi-platform user identity linkage with multi-information

    User identity linkage (UIL) aims to link identities belonging to the same individual across various platforms. While numerous methods have been...

    Qian Zhou, Yihan Hei, ... Lei Zhao in Knowledge and Information Systems
    Article 28 March 2024
  4. Fault-tolerant identity-based encryption from SM9

    This paper initiates the formal study of attribute-based encryption within the framework of SM9, the Chinese National Cryptography Standard for...

    **aohong Liu, **nyi Huang, ... Wei Wu in Science China Information Sciences
    Article 22 January 2024
  5. Decentralized Digital Identity

    The importance of secure and private identity management cannot be overstated. Identity data breaches have had far-reaching consequences, impacting...
    Shivakumar R. Goniwada in Introduction to One Digital Identity
    Chapter 2024
  6. Secure SSI framework using the optimized Orkey identity schema

    In the era of digital transformation and increasing concerns regarding data privacy, the concept of Self-Sovereign Identity (SSI) has attained...

    K. Pandu N., A. Sasi Kumar in International Journal of Information Technology
    Article 28 June 2024
  7. Decentralised identity federations using blockchain

    Federated Identity Management offers numerous economic benefits and convenience to Service Providers and users alike. In such federations, the...

    Mirza Kamrul Bashar Shuhan, Syed Md. Hasnayeen, ... Md Sadek Ferdous in International Journal of Information Security
    Article 16 May 2024
  8. Leakage-resilient identity-based cryptography from minimal assumptions

    Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...

    Yanwei Zhou, Bo Yang, ... Yi Mu in Designs, Codes and Cryptography
    Article 16 August 2023
  9. Facial mask attention network for identity-aware face super-resolution

    Face Super-Resolution (FSR) is a crucial research topic in image restoration field, which is a fundamental task for subsequent face applications,...

    Zhengzheng Sun, Lianfang Tian, ... Zhaolin Wang in Neural Computing and Applications
    Article 13 December 2022
  10. Self-Sovereign Identity Model: Ethics and Legal Principles

    The emergence of Self-Sovereign Identity (SSI) as a new digital identity paradigm has gained significant attention due to its potential to...

    Luca Mattei, Francesca Morpurgo, ... Tetiana Vasylieva in Digital Society
    Article 07 June 2024
  11. Age-invariant face recognition based on identity-age shared features

    Decoupling the mixed face features to obtain identity features that are not disturbed by age information is the key to achieving cross-age face...

    Zikang Zhang, Songfeng Yin, Liangcai Cao in The Visual Computer
    Article 08 October 2023
  12. Identity-Preserving Adversarial Training for Robust Network Embedding

    Network embedding, as an approach to learning low-dimensional representations of nodes, has been proved extremely useful in many applications, e.g.,...

    Ke-Ting Cen, Hua-Wei Shen, ... Xue-Qi Cheng in Journal of Computer Science and Technology
    Article 30 January 2024
  13. High similarity controllable face anonymization based on dynamic identity perception

    In the meta-universe scenario, with the development of personalized social networks, interactive behaviors such as uploading and sharing personal and...

    Jiayi Xu, Xuan Tan, ... Shanqing Zhang in The Visual Computer
    Article 18 June 2024
  14. Topic and knowledge-enhanced modeling for edge-enabled IoT user identity linkage across social networks

    The Internet of Things (IoT) devices spawn growing diverse social platforms and online data at the network edge, propelling the development of...

    Rui Huang, Tinghuai Ma, ... Tao Du in Journal of Cloud Computing
    Article Open access 21 May 2024
  15. Identity Provisioning

    The first step in the life of an identity is its creation. If Descartes had lived in the time of Internet identity, he might have quipped, “Ego...
    Yvonne Wilson, Abhishek Hingnikar in Solving Identity Management in Modern Applications
    Chapter 2023
  16. Identity-based remote data integrity auditing from lattices for secure cloud storage

    In recent years, cloud storage services have risen widely, and how to ensure the integrity of outsourced data in cloud setting catches more and more...

    Songrun Yang, **yong Chang in Cluster Computing
    Article 13 February 2024
  17. Identity verifiable ring signature scheme for privacy protection in blockchain

    The revolutionary technology blockchain is spreading into many applications because of its features like immutability, decentralization,...

    S. Devidas, N. Rukma Rekha, Y. V. Subba Rao in International Journal of Information Technology
    Article 25 May 2023
  18. A lightweight identity based generalized signcryption scheme for secure communication in standard model

    The implementation of secure communication in the Industrial Internet of Things (IIoT) has made and it is a significant security concern....

    Tej Singh, Mukesh Kumar, ... Worku Jifara Sori in International Journal of Information Technology
    Article 22 December 2023
  19. Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data

    With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive...

    Danial Shiraly, Ziba Eslami, Nasrollah Pakniat in Journal of Cloud Computing
    Article Open access 26 May 2024
  20. Identity-based proof of retrievability meets with identity-based network coding

    Network coding and cloud storage are two quite different areas in their nature and were studied independently in the past years. In recent years,...

    Yixin Chen, **yong Chang in Cluster Computing
    Article 24 January 2022
Did you find what you were looking for? Share feedback.