Zobrazeno 1 - 10
of 208
pro vyhledávání: '"Man-Ho Au"'
Publikováno v:
IEEE Transactions on Mobile Computing. 22:3303-3317
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:708-723
Publikováno v:
IEEE Transactions on Information Forensics and Security. 18:1052-1063
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3038-3054
As a promising alternative solution to cloud storage, decentralized storage networks (DSN) are widely anticipated to develop continuously and reshape the storage market share in the foreseeable future. In particular, one of the most important researc
Publikováno v:
IEEE Transactions on Information Forensics and Security. 17:1573-1582
Publikováno v:
IEEE Transactions on Services Computing. 14:1519-1530
Filtering refers to an operation to determine whether the concerned data should be accepted and transferred, or be blocked and marked as a malicious traffic flow. It mitigates the inter-domain bandwidth overhead, local computational cost and storage
Publikováno v:
IEEE Transactions on Services Computing. 14:683-694
A procurement protocol is a protocol for a buyer to purchase digital goods at their prices from a vendor. A procurement protocol with privacy preservation can be achieved by priced oblivious transfer (POT). POT allows the buyer to obliviously procure
Publikováno v:
Advanced Engineering Informatics. 56:101994
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 18:679-691
Monero provides a high level of anonymity for both users and their transactions. However, many criminal activities might be committed with the protection of anonymity in cryptocurrency transactions. Thus, user accountability (or traceability) is also
Publikováno v:
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security.