Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Mang Su"'
Publikováno v:
Tongxin xuebao, Vol 42, Pp 54-64 (2021)
To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient sa
Externí odkaz:
https://doaj.org/article/dd88ebd4b92b4fdd9a25eea03777b62c
Publikováno v:
网络与信息安全学报, Vol 7, Pp 147-153 (2021)
Ordinary digital signatures have many deficiencies in effectively protecting users' privacy, and signature repudiation and tracking occur from time to time.In order to solve the above problems, a partial blind signature scheme based on the SM9 algori
Externí odkaz:
https://doaj.org/article/b747aa80001643ff967062cc5913dc70
Publikováno v:
IEEE Access, Vol 8, Pp 148157-148168 (2020)
Certificateless public key cryptography (CL-PKC) not only eliminates the need for certificates in traditional certificate-based PKC but also solves the inherent key escrow problem in identity-based PKC. However, an unsolved but critical issue in CL-P
Externí odkaz:
https://doaj.org/article/647e86e9fcc04ec0b0d56f3d1e4fa538
Publikováno v:
BMC Anesthesiology, Vol 19, Iss 1, Pp 1-6 (2019)
Abstract Background There is no consensus on the optimal anesthesia method for intertrochanteric fracture surgeries in elderly patients. Our study aimed to compare the hemodynamics and perioperative outcomes of general anesthesia with endotracheal in
Externí odkaz:
https://doaj.org/article/28f9e4049df24bd284b2fecf482e552d
Publikováno v:
Tongxin xuebao, Vol 39, Pp 89-97 (2018)
The programming language for proxy re-encryption(PLPRE) based on domain specific language(DSL) was proposed,which was similar to the matical description and was adopt to describe the proxy re-encryption directly.The algorithm designer could describe
Externí odkaz:
https://doaj.org/article/0375aec11c67440180a8f3b38aac122c
Publikováno v:
Tongxin xuebao, Vol 39, Pp 96-104 (2018)
Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data se
Externí odkaz:
https://doaj.org/article/565be0facbce4ac3a312441c226968c3
Publikováno v:
Tongxin xuebao, Vol 34, Pp 223-229 (2013)
According to the tendency of development for digital media convergence and management of massive data, a fine-grained hypermedia document description model and its implementation were proposed, basing the analysis of the relationship between the rela
Externí odkaz:
https://doaj.org/article/924888bf1f1d4e8186c05f83666b11d8
Publikováno v:
Tongxin xuebao, Vol 33, Pp 222-227 (2012)
In order to solve the problem caused by the variety and openness of the network,the research for the models of structured document and access control were taken.A new structured document representation model and method for the security requirements o
Externí odkaz:
https://doaj.org/article/bce16fe9fecd4e42bd02664328a80d93
Publikováno v:
The Scientific World Journal, Vol 2014 (2014)
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permissio
Externí odkaz:
https://doaj.org/article/f01fc45f05ea47569446b964c5aab829
Publikováno v:
IEEE Internet of Things Journal. 9:22158-22172
At present, under the condition of privacy-preserving, vertical federated learning (VFL) has played an important role in training the machine learning models in the application scenarios, such as medical prediction, fraud detection, in which the data