Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Fuqun Wang"'
Autor:
Xu Yan, Bin Lian, Yunhao Yang, Xiaotie Wang, Jialin Cui, Xianghong Zhao, Fuqun Wang, Kefei Chen
Publikováno v:
Symmetry, Vol 16, Iss 6, p 664 (2024)
The secure computation of symmetric encryption schemes using Yao’s garbled circuits, such as AES, allows two parties, where one holds a plaintext block m and the other holds a key k, to compute Enc(k,m) without leaking m and k to one another. Due t
Externí odkaz:
https://doaj.org/article/74d7b902dc244bb895ad0c9b77c9b848
Publikováno v:
IET Information Security, Vol 2024 (2024)
The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices. However, the lack of appropriate security measures can lead to una
Externí odkaz:
https://doaj.org/article/9cff21de61ac488e8ed5d7b739e265d7
Publikováno v:
BioResources, Vol 18, Iss 2, Pp 3750-3767 (2023)
Wooden columns, as an important load-bearing wooden component of traditional wooden structures, determine the safety of an entire building. With the increase in material deterioration, the overall health and life of ancient buildings is affected. In
Externí odkaz:
https://doaj.org/article/2b73be39ccbb4adb91cec59313434ee1
Publikováno v:
IEEE Access, Vol 11, Pp 35232-35242 (2023)
With the continuous and rapid development of Cloud Computing, Big Data and Internet of Things, it is extremely critical to protect data with homomorphism, privacy and integrity. For this, Rezaeibagha et al. proposed a new cryptographic primitive, cal
Externí odkaz:
https://doaj.org/article/070fa8c7eaf344b9acad59609044ca16
Publikováno v:
IET Information Security, Vol 2023 (2023)
With the deepening of research, how to construct a fully homomorphic signcryption scheme based on standard assumptions is a problem that we need to solve. For this question, recently, Jin et al. proposed a leveled fully homomorphic signcryption schem
Externí odkaz:
https://doaj.org/article/762fccf3e7724f3fa52fbf045a010ef8
Publikováno v:
Journal of International Medical Research, Vol 49 (2021)
Background To identify the risk factors associated with rebleeding in obscure gastrointestinal bleeding (OGIB) patients from southern China. Methods This retrospective study involved 229 patients who underwent small bowel endoscopy in our hospital be
Externí odkaz:
https://doaj.org/article/9fb203c24f5b459f97f8fe06c69cbc55
Publikováno v:
IEEE Access, Vol 7, Pp 79299-79310 (2019)
The first identity-based fully homomorphic encryption (IBFHE) scheme was constructed from identity-based encryption (IBE) and lattice-based cryptography by Gentry, Sahai, and Waters in CRYPTO 2013. Their IBFHE scheme is improved in this paper, exploi
Externí odkaz:
https://doaj.org/article/742daf6a93b04c9a9b20b97d94cdc6db
Autor:
Weixian Kong, Yue Peng, Caoyu Ji, Zekun Liu, Shuya Gao, Yuexin Zhang, Jiawen Chen, Xie Li, Mengmeng Bao, Yubin Zhang, Qizhou Jiang, Fuqun Wang, Zhe Li, Xiaohong Bian, Junmei Ye
Publikováno v:
Clinical Science. 137:823-841
The present study aims to investigate the role of AKT2 in the pathogenesis of hepatic and cardiac lipotoxicity induced by lipid overload-induced obesity and identify its downstream targets. WT and Akt2 KO mice were fed either normal diet, or high-fat
Publikováno v:
Wireless Personal Communications. 130:2231-2240
Publikováno v:
Security and Communication Networks. 2022:1-11
Although the fully homomorphic signature (FHS) has made great progress, the low efficiency of existing FHS schemes as one main drawback cannot reach the requirements in practical application. It is well known that Number-Theory-Research-Unit (NTRU)-b