Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Shimao Yao"'
Publikováno v:
ISPRS International Journal of Geo-Information, Vol 13, Iss 9, p 321 (2024)
Satellite service systems transfer data from satellite providers to the big data industry, which includes data traders and data analytics companies. This system needs to provide access to numerous users whose specific identities are unknown. Cipherte
Externí odkaz:
https://doaj.org/article/083a2a9e167b454185dc41d75f9c23cb
Autor:
Zhuolin Mei, Jing Zeng, Caicai Zhang, Shimao Yao, Shunli Zhang, Haibin Wang, Hongbo Li, Jiaoli Shi
Publikováno v:
ISPRS International Journal of Geo-Information, Vol 13, Iss 8, p 281 (2024)
With the rapid development of geo-positioning technologies, location-based services have become increasingly widespread. In the field of location-based services, range queries on geographical data have emerged as an important research topic, attracti
Externí odkaz:
https://doaj.org/article/feaefa8cf9974cad8562056cdc152af2
Publikováno v:
IEEE Access, Vol 9, Pp 42801-42816 (2021)
Proxy re-encryption (PRE), with the unique ciphertext transformation ability, enables various ciphertext authorization applications to be implemented efficiently. However, most existing PRE schemes mainly focus on access authorization while ignoring
Externí odkaz:
https://doaj.org/article/28fde7ea15b04db199d1a606683539f5
Publikováno v:
KSII Transactions on Internet & Information Systems; Sep2024, Vol. 18 Issue 9, p2717-2738, 22p
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783031270406
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2e409a85b086b9d55b7af453b946b76b
https://doi.org/10.1007/978-3-031-27041-3_11
https://doi.org/10.1007/978-3-031-27041-3_11
Publikováno v:
Security and Communication Networks, Vol 2020 (2020)
In order to solve the challenges of user data security in the cloud computing (storage) environment, many encryption solutions with different features have been presented. Among them, proxy reencryption (PRE) based on public-key infrastructure (PKI)
Publikováno v:
SSRN Electronic Journal.
Autor:
Shimao Yao, In-Ho Ra
Publikováno v:
SMA
The safety of the key determines the security of a cryptography-based encryption scheme. The key security policy requires users to update their keys periodically and to synchronize the ciphertext. However, it is challenging to update encrypted data s
Publikováno v:
Information Sciences. :250-265
Digital transmission of medical images often involves hiding crucial information in some parts of the images which should be later extracted to authenticate ownership and identity. In this paper, a new reversible data hiding (RDH) algorithm for medic
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319607528
In this paper, a reversible authentication scheme for wireless sensor network (WSN) is proposed. Firstly, the WSN data stream is divided into some authentication groups, and each authentication group is composed of a generator group and a carrier gro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fa3a39bde9e61af247e80ed584e5a8cf
https://doi.org/10.1007/978-3-319-60753-5_14
https://doi.org/10.1007/978-3-319-60753-5_14