Zobrazeno 1 - 10
of 92
pro vyhledávání: '"HONGYANG YAN"'
Publikováno v:
IEEE Access, Vol 7, Pp 86384-86393 (2019)
Electronic health records (EHRs) replaced the old paper-based systems to make patient data more accurate, reliable, and more accessible. Yet, the EHRs system requires high transmission cost, energy, and waste of time for both doctors and patients. Fu
Externí odkaz:
https://doaj.org/article/325eaa6a91354ef0b66f2e9e5452adcc
Publikováno v:
IEEE Access, Vol 7, Pp 146322-146330 (2019)
Cloud computing has been widely applied in numerous applications for storage and data analytics tasks. However, cloud servers engaged through a third party cannot be fully trusted by multiple data users. Thus, security and privacy concerns become the
Externí odkaz:
https://doaj.org/article/0c9bc595481b41f5a564650280479e09
Publikováno v:
Complexity, Vol 2020 (2020)
Secret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes. One of them is based on coding theory. In this work, we construct a secret-sharing scheme
Externí odkaz:
https://doaj.org/article/4dcef0f628834c3ea48af8f51060fbb0
Publikováno v:
IEEE Access, Vol 6, Pp 20632-20640 (2018)
Identity-based cryptosystems mean that public keys can be directly derived from user identifiers, such as telephone numbers, email addresses, and social insurance number, and so on. So they can simplify key management procedures of certificate-based
Externí odkaz:
https://doaj.org/article/08f19b7c2c3646238ce69f4526277142
Publikováno v:
IEEE Access, Vol 6, Pp 69603-69611 (2018)
To gurantee the security and privacy of the patient's physiological data in wirelss body area networks (WBANs), it is important to secure the communication between the personal digital assistance held by the WBANs client and the application provider,
Externí odkaz:
https://doaj.org/article/d0ca482f60a64e6c90d41bad302707ab
Publikováno v:
Complexity, Vol 2019 (2019)
Surveillance systems paradigm envisions the pervasive interconnection and cooperation of interactive devices over the Internet infrastructure. Nevertheless, dissemination and processing of surveillance video amid the Internet of Things (IoT) applicat
Externí odkaz:
https://doaj.org/article/a2ba4473a2e34a98a68d578d2b26b505
Publikováno v:
Sensors, Vol 18, Iss 6, p 1814 (2018)
In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local
Externí odkaz:
https://doaj.org/article/d0e78f1b271f4b01a3276de30f3feaaf
Publikováno v:
Information Sciences. 634:27-41
Autor:
LI HU, ANLI YAN, HONGYANG YAN, JIN LI, TENG HUANG, YINGYING ZHANG, CHANGYU DONG, CHUNSHENG YANG
Publikováno v:
ACM Computing Surveys; Apr2024, Vol. 56 Issue 4, p1-34, 34p
Publikováno v:
Information Sciences. 628:439-448