SECURE CIPHER TEXT POLICY FOR MILITARY
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 6
Abstract
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity. Disruption - tolerant network (DTN) technol ogies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information. Disruption - tolerant network (DTN) technologies are becoming successful solutions that allow nod es to communicate with each other in this extreme networking environment. The concept of attribute - based encryption (ABE) is a promising approach that fulfils the requirements for secure data retrieval in DTNs. Especially, Ciphertext - Policy ABE (CP - ABE) pr ovides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy .
Authors and Affiliations
Shazia Saleem , Raafiya Gulmeher
Enhancement the Performance of Condenser of Split type Air Conditioning System by using Evaporative Cooling: A Review
The improvement of coefficient of performance and reduction of energy consumption of a split air conditioning system. When retrofitted with evaporative cooling in the condenser of split air conditioner is reviewed...
Comparative Study: Performance of SCTP with Competing Flows of the TCP over a Wired Network
The Stream Control Transmission Protocol has many features such as multi-streaming and multi-homing, and based on these features that enable to deal with multimedia applications. Therefore, it has become possible...
A STUDY TO IDENTIFY THE FACTORS AFFECTING EMPLOYEE TURNOVER IN SMALL SCALE INDUSTRIES
Now-a-days small scale industries play a very vital role to develop the economy of the country. In this vital segment of Indian economy i.e. a developing country, these types of industries becomes more crucial although E...
Computer Science and E
Ethics justifies about the status of task whether it is correct or not , with this it includes the factor of social adoption i .e. what we do . This paper involves the review study of various ethics themes like computer...
BRAIN MACHINE INTERFACING WITH IoT FUNTIONALITY
Brain dead people and people having any disability related to brain cannot normally communicate with others and for their betterment some electronic need to be developed and Brain Machine Interfacing (BMI) is...