针叶 发表于 2025-3-28 17:34:31
http://reply.papertrans.cn/47/4601/460015/460015_41.png刚毅 发表于 2025-3-28 18:47:16
formation based on a consortium blockchain. Based on proxy re-encryption technology and user identity attributes, the scheme divides the permissions of data users in fine granularity, and solves the problems of data tracking and access control, uses cloud computing to store medical data, reduces the阻止 发表于 2025-3-29 02:30:12
hich makes mobile health become a promising field. PHRs are collected from wireless body area networks (WBANs) and will be shared with people in different fields through public channels, increasing the risk of leaking personal privacy. Ciphertext-policy attribute-based encryption (CP-ABE) is a popul疏忽 发表于 2025-3-29 06:09:07
Silvia Romano,Carlo Caltagirone,Ugo Nocentiniin the direction of intelligence and digitalization. However, when connected vehicle devices share data in edge networks, there are security and privacy issues, e.g. leakage of sensitive information will cause serious threats. The separation of user data ownership and physical control requires usersMUTE 发表于 2025-3-29 11:16:34
A. Gallo,G. Tedeschier, how to reflect the voters’ support level for the candidates in the e-voting system in a fair and privacy-preserving way is still a problem that needs to be solved. This article proposes a private support-weighted sum (PSWS) protocol, which is a fair, and privacy-preserving weighted sum protocol.