SECURE CIPHER TEXT POLICY FOR MILITARY
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 6
Abstract
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity. Disruption - tolerant network (DTN) technol ogies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information. Disruption - tolerant network (DTN) technologies are becoming successful solutions that allow nod es to communicate with each other in this extreme networking environment. The concept of attribute - based encryption (ABE) is a promising approach that fulfils the requirements for secure data retrieval in DTNs. Especially, Ciphertext - Policy ABE (CP - ABE) pr ovides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy .
Authors and Affiliations
Shazia Saleem , Raafiya Gulmeher
A Review of Experimental Studies on the Effect of Viscosity grade on Mechanical Vibration Behavior of deep groove Ball Bearing
This paper intends to review and summarize the recent researches of Experimental Studies on the Effect of Viscosity grade on Mechanical Vibration Behavior of deep groove Ball Bearing by using lubricants without ad...
DAMAGE ANALYSIS OF DEGRADED SLITTING KNIFE
This study analyzed the damage to a slitting knife after cutting steel sheets. Damages to the structure were observed and wear tests were conducted. In addition, the degradation on the damaged and undamaged parts w...
[b]PEFORMANCE AND EMISSION CHARACTERISTICS OF WASTE PLASTIC PYROLYSIS OIL IN D.I SINGLE CYLINDER DIESEL ENGINE[/b]
Environmental concern and availability of petroleum fuels have caused interests in the search for alternative fuels for internal combustion engines.. There is a need to search for alternative fuels for the automob...
A PROPORTIONAL LEARNING ON SMART CARD AUTHENTICATION
A smart card is a pocket sized card embedded with integrated circuits. Smart Cards are used in a wide range of industries worldwide to support access, identity, payment and other applications. Even though the smar...
xIDENTIFICATION OF ISOMORPHISM OF KINEMATIC CHAINS USING DIFFERENT KINEMATIC PAIRS
Mechanical engineering design involves intuition, experience, process analysis syntheses. In this paper, an attempt has been made to provide to identification of isomorphism among the kinematic chains using differ...