Zobrazeno 1 - 10
of 311
pro vyhledávání: '"H Deng"'
Autor:
Guowen Xu, Yinghui Zhang, Jianting Ning, Yingjiu Li, Shengmin Xu, Robert H. Deng, Xinyi Huang
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:53-67
To reduce the cost of human and material resources and improve the collaborations among medical systems, research laboratories and insurance companies for healthcare researches and commercial activities, electronic medical records (EMRs) have been pr
Publikováno v:
IEEE Transactions on Cloud Computing. 11:822-838
Benefiting from the powerful computing and storage capabilities of cloud services, data sharing in the cloud has been permeated across various applications including social networks, e-health and crowdsourcing transportation system. Intuitively, outs
Publikováno v:
IEEE Transactions on Services Computing. 15:3485-3498
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one of the potent encryption paradigms in protecting data confidentiality in the cloud data sharing scenario. However, the access policy of the traditional CP-ABE is in plaintext form that reve
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3448-3463
With the increasing cloud storage service, users can enjoy non-interactive data sharing. Nonetheless, the data owner cannot timely update the shared data all the while. To ensure the timeliness and the authoritative source of the data, some users sho
Autor:
Juanru Li, David Lo, Surya Nepal, Elisa Bertino, Siqi Ma, Robert H. Deng, Diet Ostry, Sanjay Jha
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2165-2178
Passwords are pervasively used to authenticate users' identities in mobile apps. To secure passwords against attacks, protection is applied to the password authentication protocol (PAP). The implementation of the protection scheme becomes an importan
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2138-2148
Cloud computing is considered as one of the most prominent paradigms in the information technology industry, since it can significantly reduce the costs of hardware and software resources in computing infrastructure. At the first sight, by merely sto
Publikováno v:
IEEE Transactions on Cloud Computing. 10:835-848
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving data confidentiality securely. Many SE solutions have been designed to improve efficiency and security, but most of them are still susceptible to insider Keyw
Publikováno v:
IEEE Transactions on Industrial Informatics. 18:2807-2810
As a novel network infrastructure that realizes the interconnection of humans, machines, and things, the 5G-based or blockchain-based applications have been widely deployed in the Industrial Internet of Things (IIoT). However, there are still many ch
Autor:
Yinbin Miao, Robert H. Deng, Yu Gao, Jianfeng Ma, Kim-Kwang Raymond Choo, Zhuoran Ma, Ximeng Liu
Publikováno v:
IEEE Transactions on Industrial Informatics. 18:953-964
With the large-scaled data generated from various interconnected machines and networks, Industrial Internet of Things (IIoT) provides unprecedented opportunities for facilitating data mining for industrial applications. The current IIoT architecture
Publikováno v:
IEEE Transactions on Cloud Computing. 10:474-490
Healthcare Internet-of-Things (IoT) is an emerging paradigm that enables embedded devices to monitor patients' vital signals and allows these data to be aggregated and outsourced to the cloud. The cloud enables authorized users to store and share dat