Zobrazeno 1 - 10
of 110
pro vyhledávání: '"Zhengping Jin"'
Publikováno v:
IEEE Access, Vol 8, Pp 1031-1047 (2020)
Smart Grid Monitoring System(SGMS) is an important means to protect the security of smart grid. The high volumes of alerts generated by SGMS often confuse managers. Automatically handling alerts and extracting attack events is a critical issue for sm
Externí odkaz:
https://doaj.org/article/2c84b749411e4b7ca91504e5622a2f87
Publikováno v:
IEEE Access, Vol 7, Pp 29023-29037 (2019)
Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are of
Externí odkaz:
https://doaj.org/article/be67512ca38e42a7a867decb5839b739
Publikováno v:
Sensors, Vol 22, Iss 2, p 599 (2022)
In the field of video action classification, existing network frameworks often only use video frames as input. When the object involved in the action does not appear in a prominent position in the video frame, the network cannot accurately classify i
Externí odkaz:
https://doaj.org/article/236aefc40f4144a588b6c269fab8b435
Publikováno v:
IEEE Access, Vol 6, Pp 5393-5401 (2018)
Blockchain is a new distributed and decentralized technology, and gradually attracts worldwide attention, but it is vulnerable to quantum attacks that would solve elliptic curve digital logarithm problem, which is mainly used for transaction authenti
Externí odkaz:
https://doaj.org/article/2ff597c6f01d44c7afcd191bac2a227f
Publikováno v:
IEEE Access, Vol 6, Pp 33986-33994 (2018)
An aggregate signature turns multi-message multi-authentication into multi-message single-authentication, reducing the required storage space, transmission cost, and number of verification calculations, and is suitable for fast message authentication
Externí odkaz:
https://doaj.org/article/ae1c6c1020804ef1b5fdc55faee4bf34
Publikováno v:
IEEE Access, Vol 6, Pp 58955-58966 (2018)
Attribute-based encryption (ABE) has a broad developing prospect in fine-grained sharing of ciphertext in the background of cloud computing. However, most of ABE schemes have a potential security risk called key escrow problem because users’ secret
Externí odkaz:
https://doaj.org/article/60ac455464a2482ebfea6b16d37d505b
Publikováno v:
Applied Sciences, Vol 11, Iss 14, p 6557 (2021)
Ransomware has become a serious threat on Android and new cases of ransomware are continuously growing. Most existing ransomware detectors use sensitive text or APIs to detect ransomware. Some goodware applications with the functionalities of locking
Externí odkaz:
https://doaj.org/article/38ddefa5476b4cb59b54d415850a26ce
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 15 (2019)
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks. The outsourced attribute-based encryption scheme is convinced to be
Externí odkaz:
https://doaj.org/article/95d55d78cae54ee7ad50e2c646749b37
Publikováno v:
Sensors, Vol 20, Iss 23, p 6962 (2020)
Internet of Things (IoT) and cloud computing are adopted widely in daily life and industrial production. Sensors of IoT equipment gather personal, sensitive and important data, which is stored in a cloud server. The cloud helps users to save cost and
Externí odkaz:
https://doaj.org/article/bda29e1ecba944ed9f0163dff11b2094
Autor:
Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen
Publikováno v:
Symmetry, Vol 11, Iss 2, p 272 (2019)
Digital signature with proxy delegation, which is a secure ownership enforcement tool, allows an original signer to delegate signature rights to a third party called proxy, so that the proxy can sign messages on behalf of the original signer. Many re
Externí odkaz:
https://doaj.org/article/7575b0ca706b49109897ba09591b99aa