Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Yanshuo ZHANG"'
Publikováno v:
PeerJ Computer Science, Vol 10, p e2190 (2024)
This article introduces a deniable ring signature scheme within the framework of a ring signature protocol, which allows a member of the ring to assert or deny their role as the signature’s originator without the involvement of a trusted third part
Externí odkaz:
https://doaj.org/article/f6b1e18e6530428485529e06d5328a79
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-11 (2023)
Abstract The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution environment. In order to solve the issues of high storage cost and inadequate security about most cur
Externí odkaz:
https://doaj.org/article/9be5c658850041e2ae6a911679d780ce
Publikováno v:
Applied Sciences, Vol 14, Iss 20, p 9323 (2024)
Hydropower units are integral to sustainable energy production, and their operational reliability hinges on accurate status prediction. This paper introduces an innovative hybrid deep learning model that synergistically integrates a Temporal Convolut
Externí odkaz:
https://doaj.org/article/b557013bb49242c1ba6abd4325a9bf89
Publikováno v:
Tongxin xuebao, Vol 44, Pp 168-178 (2023)
In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round funct
Externí odkaz:
https://doaj.org/article/7aee94933653452d8dac344836430527
Publikováno v:
Tongxin xuebao, Vol 44, Pp 178-185 (2023)
The adapter signature scheme can provide good properties of atomic exchange in the block chain, and has been widely used in practice.A new adapter signature scheme was constructed based on a digital signature algorithm for improved security of RSA cr
Externí odkaz:
https://doaj.org/article/666fe44f7aa44ef4899d93c997dc2bfe
Publikováno v:
Tongxin xuebao, Vol 44, Pp 142-152 (2023)
Most current JPEG steganalytic methods can only extract features from a series of linear residuals.Non-linear filters are not considered in these JPEG steganalytic methods, resulting in single types of residuals.Hence, a JPEG steganalytic method usin
Externí odkaz:
https://doaj.org/article/38a1c9874c914e7299eb2df700952f44
Autor:
Ang Liu, Xiu-Bo Chen, Shengwei Xu, Zhuo Wang, Zhengyang Li, Liwei Xu, Yanshuo Zhang, Ying Chen
Publikováno v:
Entropy, Vol 25, Iss 5, p 811 (2023)
Blockchain technology affords data integrity protection and building trust mechanisms in transactions for distributed networks, and, therefore, is seen as a promising revolutionary information technology. At the same time, the ongoing breakthrough in
Externí odkaz:
https://doaj.org/article/bd416d84dfd14764a36a01e799db4379
Publikováno v:
Tongxin xuebao, Vol 40, Pp 149-154 (2019)
In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme tha
Externí odkaz:
https://doaj.org/article/95edf28101794f0eb3dbdedcb92fa470
Publikováno v:
Tongxin xuebao, Vol 39, Pp 169-175 (2018)
Utilizing the characteristic that the characteristic equation of the n-th order matrix have multiple roots,the secret distributor distributes two different sub-keys to each participant,and these two sub-keys satisfy two conditions:linear independent
Externí odkaz:
https://doaj.org/article/ea2f8679ce67432caf15f06082d41a89
Autor:
Jing Tang, Yiang Chen, Jinyuan Li, Shuo Yan, Zenan Wang, Xinyu Deng, Ke Feng, Yanshuo Zhang, Chunrong Chen, Huixia Geng, Yanming Wang, Lai Wang
Publikováno v:
CNS Neuroscience & Therapeutics.