Zobrazeno 1 - 10
of 174
pro vyhledávání: '"Chunfu JIA"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-17 (2024)
Abstract Electronic health record (EHR) cloud system, as a primary tool driving the informatization of medical data, have positively impacted both doctors and patients by providing accurate and complete patient information. However, ensuring the secu
Externí odkaz:
https://doaj.org/article/88737a53dbbf4e9886bcc9ba10fc3a4e
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-12 (2024)
Abstract Timed-release encryption (TRE) is a cryptographic primitive that can control the decryption time and has significant application value in time-sensitive scenarios. To solve the reliability issue of nodes in existing TRE anonymous interaction
Externí odkaz:
https://doaj.org/article/09c07fca0450439da84bea181b160391
Publikováno v:
Digital Communications and Networks, Vol 9, Iss 5, Pp 1180-1189 (2023)
The proliferation of Internet of Things (IoT) rapidly increases the possiblities of Simple Service Discovery Protocol (SSDP) reflection attacks. Most DDoS attack defence strategies deploy only to a certain type of devices in the attack chain,and need
Externí odkaz:
https://doaj.org/article/12ae6e6ab27548fe9e57661a211558e5
Publikováno v:
Complex & Intelligent Systems, Vol 10, Iss 1, Pp 1131-1147 (2023)
Abstract Cryptographic technology can effectively defend against malicious attackers to attack sensitive and private information. The core of cryptographic technology is cryptographic algorithm, and the cryptographic algorithm identification is the p
Externí odkaz:
https://doaj.org/article/420fb0393276474eb0e7ed3798598181
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-11 (2023)
Abstract Many time-sensitive scenarios need to decrypt data at a specified time. The timed-release encryption (TRE) primitive can meet this requirement. However, in the single-time server TRE model, there is a single point of failure problem. Therefo
Externí odkaz:
https://doaj.org/article/c64dfb51136c4458a266ba5d439f920a
Publikováno v:
PeerJ Computer Science, Vol 9, p e1649 (2023)
Compared with paper-based voting, electronic voting not only has advantages in storage and transmission, but also can solve the security problems that exist in traditional voting. However, in practice, most electronic voting faces the risk of voting
Externí odkaz:
https://doaj.org/article/94ced85e8ec4438f82c1bfd29971400f
Publikováno v:
Tongxin xuebao, Vol 43, Pp 17-29 (2022)
It is effective to balance data security and storage efficiency for setting different levels of security protection for data based on popularity in encrypted deduplication systems.Existing schemes all need introduce a trusted third-party for recordin
Externí odkaz:
https://doaj.org/article/efa7272fb38f45b595d06fcda8dd0f16
Publikováno v:
Tongxin xuebao, Vol 42, Pp 67-80 (2021)
Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user
Externí odkaz:
https://doaj.org/article/0436fe003e1940bb9e9f8f2acd373b63
Publikováno v:
PeerJ Computer Science, Vol 8, p e1110 (2022)
Cryptographic algorithm identification, which refers to analyzing and identifying the encryption algorithm used in cryptographic system, is of great significance to cryptanalysis. In order to improve the accuracy of identification work, this article
Externí odkaz:
https://doaj.org/article/78a7388e7f84471799772c02e321fa24
Publikováno v:
Tongxin xuebao, Vol 42, Pp 11-22 (2021)
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext w
Externí odkaz:
https://doaj.org/article/72da371eb85e40d8aa38a8e51835d221