SECURE CIPHER TEXT POLICY FOR MILITARY
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 6
Abstract
Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity. Disruption - tolerant network (DTN) technol ogies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information. Disruption - tolerant network (DTN) technologies are becoming successful solutions that allow nod es to communicate with each other in this extreme networking environment. The concept of attribute - based encryption (ABE) is a promising approach that fulfils the requirements for secure data retrieval in DTNs. Especially, Ciphertext - Policy ABE (CP - ABE) pr ovides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. Thus, different users are allowed to decrypt different pieces of data per the security policy .
Authors and Affiliations
Shazia Saleem , Raafiya Gulmeher
OPTIMUM PARTIAL REPLACEMENT OF CEMENT IN CONCRETE WITH WASTE MARBLE DUST IN CONJUNCTION WITH SUPER PLASTICIZERS
Efforts have been made over years to make concrete production sustainable and environment friendly.Notion of new materials as substitute for the conventional materials have supported these efforts to a large e...
A REVIEW ON ENCODING AND RECONSTUCTION OF ENCRYPTED IMAGES
This paper gives a scheme of encoding of encrypted greyscale images while transmission of images for security purpose. In the encryption phase, the original pixel values are masked by a modulo-256 addition with pseudora...
FABRICATION AND FOURIER TRANSFORM INFRARED SPECTROSCOPY STUDIES ON PVP BASED POLYMER NANOCOMPOSITES
A nano composite is a multi phase solid material where one of the phases has dimensions of less than 100 nano meters. Nano composites have different properties for specific applications. In this work PVP based...
Study on Causes and Issues of Big-Data
An increasing amount of data is becoming available on the internet. Each and every one of us is constantly producing and releasing data about ourselves. We do this either by moving around passively - our behavior...
Novel Algorithm for Iris Biometrics Using Fast Wavelet Transforms
Iris recognition is a potential tool in secure personal identification and authentication system which has the properties such as uniqueness, non-invasiveness and stability of human iris patterns. The method propo...