Zobrazeno 1 - 10
of 90
pro vyhledávání: '"Jinxia, Yu"'
Publikováno v:
Entropy, Vol 26, Iss 9, p 793 (2024)
The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency. An efficient cut-and-choose oblivious transfer protocol is proposed
Externí odkaz:
https://doaj.org/article/bf6b7465cc154738bb5cfda80f8c687a
Autor:
Shenjie Cheng, Panke Qin, Baoyun Lu, Jinxia Yu, Yongli Tang, Zeliang Zeng, Sensen Tu, Haoran Qi, Bo Ye, Zhongqi Cai
Publikováno v:
PLoS ONE, Vol 19, Iss 5, p e0303688 (2024)
Deep learning models struggle to effectively capture data features and make accurate predictions because of the strong non-linear characteristics of arbitrage data. Therefore, to fully exploit the model performance, researchers have focused on networ
Externí odkaz:
https://doaj.org/article/5cbb1f1960af4d699864983c34095a3d
Autor:
Chengyu Pan, Jinxia Yu, Qian Yao, Nan Lin, Zhenping Lu, Yan Zhang, Shasha Zhao, Zixia Wang, Xiaoning Lei, Ying Tian, Yu Gao
Publikováno v:
Environment International, Vol 163, Iss , Pp 107180- (2022)
Background: An increasing number of studies have reported neonicotinoid insecticides (NEOs), the emerging alternatives to conventional insecticides, may increase oxidative stress and cause adverse health effects, but limited is known about the prenat
Externí odkaz:
https://doaj.org/article/3304fa1f6a48486e8935d7a725684f92
Publikováno v:
Tongxin xuebao, Vol 41, Pp 150-161 (2020)
Aiming at the problem that the traceability of a traceable attribute-based encryption (ABE) scheme was not sufficient to address the key abuse completely,a traceable ABE scheme against key-delegation abuse was proposed.A secret parameter was be share
Externí odkaz:
https://doaj.org/article/8dc1a9c40eac4e3382138bbc5022257a
Publikováno v:
IEEE Access, Vol 7, Pp 128298-128312 (2019)
In a ciphertext-policy attribute-based encryption (CP-ABE) system, the decryption keys are only related to attributes shared by multiple users and do not contain any identity information of their original holders. Hence, if a decryption key is leaked
Externí odkaz:
https://doaj.org/article/f68f946359e045d3bca2424d2d4cffde
Publikováno v:
IEEE Access, Vol 7, Pp 133248-133256 (2019)
For the rapid increase in the number of optical line terminals (OLTs) and optical network units (ONUs) connected to the control center in the software defined optical access network (SDOAN) environment, the security problems caused by the communicati
Externí odkaz:
https://doaj.org/article/deb19bb539214688980a56b949289d6e
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 16 (2020)
Attribute-based encryption is an efficient and flexible fine-grained access control scheme. However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed. Firs
Externí odkaz:
https://doaj.org/article/7d05a6d7c110492eabd0b613b472f365
Publikováno v:
Tongxin xuebao, Vol 39, Pp 87-97 (2018)
Password-based three-party authenticated key exchange protocol allow clients to establish a protected session key through a server over insecure channels.Most of the existing PAKE protocols on lattices were designed for the two parties,which could no
Externí odkaz:
https://doaj.org/article/c16e8f192c3e493ba48f30f4167810e3
Publikováno v:
SAE Technical Paper Series.
The introduction of more stringent emission regulatory standards, such as China 6 and Euro 6, with test cycles that are more representative of real-world driving, from WLTP to RDE presents significant challenges to the emission development of interna
Publikováno v:
Proceedings of the 2022 11th International Conference on Networks, Communication and Computing.