Cryptographic Cloud Storage with Anonymous Authentication
The cloud verifies the authenticity without knowing the user’s identity before storing data and has the added feature of access control in which only validated users are able to decrypt the stored information.
Crosscap two of class of graphs from commutative rings
Let [Formula: see text] be a commutative ring with identity and [Formula: see text] be the set of all nonzero zero-divisors of [Formula: see text]. The annihilator graph of commutative ring [Formula:…
Enhanced Packet Delivery Techniques Using CryptoLogic on Jamming Attacks for Wireless Communication Medium
This paper addresses the problem of jamming under an internal threat model, presenting a challenger model for selective jamming attacks, and develops three schemes that prevent real-time packet classification by combining cryptographic primitives with physicallayer attributes.
A Novel Approach for Attribute Based Encryption in Cloud Computing
A CP-ABE based encryption scheme that provides fine-grained access control and a set of attributes based on which the user’s private key is generated is described.