Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Qianyi Dai"'
Publikováno v:
ISPRS International Journal of Geo-Information, Vol 13, Iss 9, p 338 (2024)
The combination of encryption and digital watermarking technologies is an increasingly popular approach to achieve full lifecycle data protection. Recently, reversible data hiding in the encrypted domain (RDHED) has greatly aroused the interest of ma
Externí odkaz:
https://doaj.org/article/595bcc7cb7a24cb98d5d5b90c870148a
Publikováno v:
Tongxin xuebao, Vol 44, Pp 66-80 (2023)
To improve the comprehensive generalized feature perception ability of mixed attack traffic on the blockchain network layer, and enhance the performance of abnormal traffic detection, a blockchain layer traffic anomaly detection method was proposed t
Externí odkaz:
https://doaj.org/article/b7ee418555bd4811a2c27b422696297c
Publikováno v:
Water, Vol 16, Iss 7, p 1006 (2024)
The process of dust transportation is widespread, leading to the formation of regions such as the Loess Plateau. In order to understand the mechanisms of dust particle transportation, this study conducted wind tunnel experiments to simulate natural w
Externí odkaz:
https://doaj.org/article/cbea3d634efa451eb3c9600cd8ece367
Publikováno v:
网络与信息安全学报, Vol 4, Pp 23-35 (2018)
Regarding the difficult key management and excessive communication overhead in the distributed group networks,KMSBoB-Key management schemes based on blockchain was proposed,featuring key management and transmitting procedure based on blockchain in di
Externí odkaz:
https://doaj.org/article/5b4ddecb4ee54937a94f6afd07b8b0c0
Publikováno v:
Computers, Materials & Continua. 75:5395-5431
Publikováno v:
Wireless Communications and Mobile Computing. 2022:1-19
An eclipse attack is a common method used to attack the blockchain network layer; however, detecting eclipse attacks is challenging, and the performance of existing methods is inadequate due to uneven sample distribution, incomplete definition of dis
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811532771
With the current blockchain-based Public Key Infrastructure (PKI) being in its early stage of R&D, it is suffering from many shortcomings, such as its reliance on the centralized Certificate Authority (CA), the faulty identity registration and verifi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e81d3529c8dc7263e656353c8bf07209
https://doi.org/10.1007/978-981-15-3278-8_11
https://doi.org/10.1007/978-981-15-3278-8_11
Publikováno v:
2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).
In order to solve the security problem that private data can be easily disclosed in the centralized storage mode of the Trusted Third Party (TTP), and to realize the dynamic trusted security storage of private data in distributed environment, we desi