Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Yi-Liang Han"'
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 15 (2019)
Toward the goal of high security and efficiency for data collection in wireless sensor network, this article proposed an adaptable secure compressive sensing–based data collection scheme for distributed wireless sensor network. It adopted public ke
Externí odkaz:
https://doaj.org/article/bc7788ed686d49b98da663e9e656188f
Publikováno v:
网络与信息安全学报, Vol 3, Iss 9, Pp 24-30 (2017)
A new relative influence weight function was proposed in combination with the existing linear threshold model.Combining with the information itself sensitivity and the threshold characteristic of the node itself,a threshold model(URLT model) was prop
Externí odkaz:
https://doaj.org/article/2a37d43b7cd844998814dc6bd5abd3b9
Publikováno v:
Security and Communication Networks, Vol 2020 (2020)
The synchronization between two neural networks by mutual learning can be used to design the neural key exchange protocol. The critical issue is how to evaluate the synchronization without a weight vector. All existing methods have a delay in evaluat
Publikováno v:
2019 Chinese Control And Decision Conference (CCDC).
The development of quantum technology is changing with each passing day. While bringing convenience to us, the security problems it brings cannot be underestimated. By studying the multivariate cryptography and coding cryptography in anti-quantum cry
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 15 (2019)
Toward the goal of high security and efficiency for data collection in wireless sensor network, this article proposed an adaptable secure compressive sensing–based data collection scheme for distributed wireless sensor network. It adopted public ke
Publikováno v:
Security and Communication Networks, Vol 2019 (2019)
Nowadays, the location privacy problem has become an important problem for the users who enjoy the location-based services (LBSs). Researchers have focused on the problem of how to protect the location privacy of user efficiently for a long time. On
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811501043
NCTCS
NCTCS
Signcryption has been extensively studied based on bilinear pairings, but rarely on lattices. This paper constructed a new lattice-based signcryption scheme in the random oracle model by skillfully combining a learning with errors over ring (R-LWE) b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1145593bd7766ce43e49c34992f9b7bb
https://doi.org/10.1007/978-981-15-0105-0_11
https://doi.org/10.1007/978-981-15-0105-0_11
Publikováno v:
Tsinghua Science and Technology. 19:486-495
Chosen Ciphertext Attack (CCA) security on the standard model is widely accepted as the standard security notion for the public key cryptosystem. The existing CCA-secure public key cryptosystems on the standard model are expensive in terms of efficie
Publikováno v:
Communications in Theoretical Physics. 59:510-516
In this paper, to study rumor spreading, we propose a novel susceptible-infected-removed (SIR) model by introducing the trust mechanism. We derive mean-field equations that describe the dynamics of the SIR model on homogeneous networks and inhomogene
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811004568
When the user getting location based services by the traditional technology, his location information of region is always be exposed. However, in modern mobile networks, even the current geographical region is a part of privacy information. To solve
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b01d7bc5f78382dfbea18a4a47f37c83
https://doi.org/10.1007/978-981-10-0457-5_20
https://doi.org/10.1007/978-981-10-0457-5_20