Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Yamin Wen"'
Publikováno v:
Information, Vol 6, Iss 4, Pp 576-591 (2015)
Secret handshake schemes have been proposed to achieve private mutual authentications, which allow the members of a certain organization to anonymously authenticate each other without exposing their affiliations. In this paper, a backward unlinkable
Externí odkaz:
https://doaj.org/article/9a06d27d3c00437da6499dfa45ee6272
Publikováno v:
Information, Vol 6, Iss 2, Pp 258-274 (2015)
One of the major applications of Radio Frequency Identification (RFID) technology is in supply chain management as it promises to provide real-time visibility based on the function of track and trace. However, such an RFID-based track and trace syste
Externí odkaz:
https://doaj.org/article/5ea29422dfe84bfdbf18b5b072678d8d
Publikováno v:
Theoretical Computer Science. 940:14-35
Publikováno v:
2022 IEEE Conference on Dependable and Secure Computing (DSC).
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 13:1525-1535
Keyword Spotting (KWS) is a significant branch of Automatic Speech Recognition (ASR) and has been widely used in edge computing devices. The goal of KWS is to provide high accuracy with a low False Alarm Rate (FAR), while reducing the costs of memory
Publikováno v:
Information Sciences. 520:142-154
With the aggravating trend of aging population in modern societies, Mobile Healthcare Social Network (MHSN) is an attracting platform for improving the life quality of elderly patients and offering mutual supports. In a sustainable MHSN system, one e
Publikováno v:
Post-Quantum Cryptography ISBN: 9783031172335
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4e064c40b08a5544e8a260f7d401419b
https://doi.org/10.1007/978-3-031-17234-2_21
https://doi.org/10.1007/978-3-031-17234-2_21
Publikováno v:
Computer Standards & Interfaces. 82:103606
Publikováno v:
Information and Communications Security ISBN: 9783030880514
ICICS (2)
ICICS (2)
Secret handshake, as a fundamental privacy-preserving primitive, allows members in the same organization to anonymously authenticate each other. Since its proposal in 2003, numerous schemes have been presented in terms of various security, efficiency
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f4584a32a7cc7943e53879a8fa9825a2
https://doi.org/10.1007/978-3-030-88052-1_14
https://doi.org/10.1007/978-3-030-88052-1_14
Publikováno v:
Proceedings of the 9th International Conference on Computer Engineering and Networks ISBN: 9789811537523
Digital certificates provided by PKI are commonly used for identification and authentication services. The corresponding private key can be protected by USB keys, TEE/SE, etc., in the hardware environment. But in the software environment, the private
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2adb2548b83ccfb6f6eeda856c97d550
https://doi.org/10.1007/978-981-15-3753-0_66
https://doi.org/10.1007/978-981-15-3753-0_66