Zobrazeno 1 - 10
of 89
pro vyhledávání: '"Maozhi Xu"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-14 (2022)
Abstract Traditional remote data possession auditing mechanisms are usually divided into two types: private auditing and public auditing. Informally, private auditing only allows the original data owner to check the integrity of its outsourced data,
Externí odkaz:
https://doaj.org/article/9cbacf09039a463cb2ce3cacb16a2c0f
Publikováno v:
IEEE Access, Vol 9, Pp 31816-31825 (2021)
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent
Externí odkaz:
https://doaj.org/article/ae23e519a22a44059e95cc7cc3f7ed8c
Publikováno v:
IEEE Access, Vol 9, Pp 21618-21626 (2021)
We are in the Internet era, when protecting the security of personal information is both vital and challenging. As the most commonly used methods of communication, centralized systems cannot meet the increasing need for information security. Blockcha
Externí odkaz:
https://doaj.org/article/4578796c1e8a4a2487c5fb27f0351735
Publikováno v:
IEEE Access, Vol 8, Pp 203917-203929 (2020)
The ever-increasing pervasiveness of decentralized applications, such as blockchain, is creating challenges for sources of randomness, which play an integral part in decentralized settings. Distributed randomness generation (DRG) protocols, aiming at
Externí odkaz:
https://doaj.org/article/8e9e623083704c5dab35647109092cc9
Publikováno v:
IEEE Access, Vol 7, Pp 50858-50868 (2019)
Recently, Lin et al. proposed a new primitive identity-based (IB) homomorphic signature scheme and presented an ingenious implement by using any IB-signature scheme as a building block. In this paper, we consider a new type of attack on their scheme:
Externí odkaz:
https://doaj.org/article/a64fcdb62d14468580928f33d82fd7a7
Publikováno v:
IEEE Access, Vol 7, Pp 88393-88398 (2019)
Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis. As Esfahani et al.
Externí odkaz:
https://doaj.org/article/7107b31f66554689be9fb162229d8469
Publikováno v:
Peer-to-Peer Networking and Applications. 15:2021-2036
Publikováno v:
2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN).
Publikováno v:
IEEE Access, Vol 9, Pp 21618-21626 (2021)
We are in the Internet era, when protecting the security of personal information is both vital and challenging. As the most commonly used methods of communication, centralized systems cannot meet the increasing need for information security. Blockcha
Publikováno v:
IEEE Access, Vol 9, Pp 31816-31825 (2021)
Covert channels are designed to protect the communication relationship of the sender and receiver. Traditional covert channels have become insecure due to the continuous improvement of traffic analysis techniques. In this context, there is an urgent