故意 发表于 2025-3-28 16:22:14

http://reply.papertrans.cn/39/3886/388552/388552_41.png

CEDE 发表于 2025-3-28 22:28:54

http://reply.papertrans.cn/39/3886/388552/388552_42.png

尽管 发表于 2025-3-29 00:46:48

A Hybrid Approach for Private Data Protection in the Cloud-compliance with the user’s preferences and/or regulations, the difficulty of the data flow tracking, etc. In particular, one unsolved problem is to ensure that customers data usage policies are enforced, regardless of who accesses the data, how they are processed, where are the data stored, transfe

organic-matrix 发表于 2025-3-29 05:41:13

An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Controlopriate alteration of signed message should be allowed for the purposes of privacy protection or bandwidth saving in some scenarios, such as medical record or official information disclosure. Redactable signatures, a branch of homomorphic signatures for editing, allow any redactor to remove some sub

Obloquy 发表于 2025-3-29 10:34:45

http://reply.papertrans.cn/39/3886/388552/388552_45.png

obeisance 发表于 2025-3-29 13:45:00

A Multi-source Homomorphic Network Coding Signature in the Standard Modelmomorphic network coding signatures in the random oracle model. But there are still no multi-source homomorphic network coding signatures in the standard model. How to construct it remains an open problem. In this paper, we propose the first multi-source homomorphic network coding signature in the s

fallible 发表于 2025-3-29 15:42:15

Trust-ABAC Towards an Access Control System for the Internet of Thingslve security and privacy issues. The use of complex encryption algorithms is infeasible due to the volatile nature of IoT environment and pervasive devices with limited resources. In this paper, we present the Trust-ABAC, an access control model for the Internet of Things, in which a coupling betwee

预测 发表于 2025-3-29 22:58:13

Privacy Preserving Multimodal Biometric Authentication in the Cloudcrypted storage and processing in the encrypted domain, the biometric database can be outsourced to the cloud. Our scheme is based on the combination of two different cryptographic primitives operating on encrypted biometric templates generated either from a single trait such as fingerprint or multi

CALL 发表于 2025-3-30 00:31:36

MOHAB: Mobile Hand-Based Biometric Recognitionh lines and taking into consideration different traits. On the other hand, few studies tackle its feasibility on mobile devices. Given their diffusion and availability, their use in this context appears particularly attractive. The work presented in this study aims at investigating at an high level

LUDE 发表于 2025-3-30 04:56:59

Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme owever, remote online systems are vulnerable to many security attacks due to they are built on public networks. Therefore it is necessary to design an authentication scheme for securing network communications between a login user and a remote server. In 2016, Han et al. proposed a secure three-facto
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: ;