FAZE 发表于 2025-3-26 22:02:51
A Security Proxy Scheme Based on Attribute Node Mapping for Cloud Storage,ever, the traditional CP-ABE scheme cannot solve the problem of integrity of could service provider according to single attributes rules. In this paper, we design a prototype system for secure cloud storage which separates storage services and security service using Attribute node mapping based on C事情 发表于 2025-3-27 04:14:36
http://reply.papertrans.cn/87/8637/863640/863640_32.png责任 发表于 2025-3-27 06:58:22
An Improved Asymmetric Searchable Encryption Scheme,ovide any search function. To increase user efficiency, an asymmetric searchable encryption scheme is designed in this paper. This improved scheme aims at fixing such flaws as “trapdoors that can be generated by anyone”, “ciphertexts that are tampered with at discretion”, “key pairs generated by useobscurity 发表于 2025-3-27 13:32:01
http://reply.papertrans.cn/87/8637/863640/863640_34.png拱墙 发表于 2025-3-27 16:08:34
http://reply.papertrans.cn/87/8637/863640/863640_35.pngurethritis 发表于 2025-3-27 20:04:28
http://reply.papertrans.cn/87/8637/863640/863640_36.pngaffluent 发表于 2025-3-28 00:23:31
http://reply.papertrans.cn/87/8637/863640/863640_37.pngPathogen 发表于 2025-3-28 04:40:07
Study on Personalized Location Privacy Protection Algorithms for Continuous Queries in LBS,y. In continuous queries, users may have different privacy requirements in different situations, so we propose two algorithms to address this problem, in which before satisfying privacy requirements, they expand cloaking area that contains least users according to the pyramid structure and user’s moAMOR 发表于 2025-3-28 07:48:39
http://reply.papertrans.cn/87/8637/863640/863640_39.png高度赞扬 发表于 2025-3-28 12:16:59
A User Authentication Scheme Based on Trusted Platform for Cloud Computing,ing security mechanism. Some of remote authentication protocols have high computational cost, and they have much interaction rounds, the credibility of remote user’s platform could not be guaranteed. In this paper, we put forward a user identity authentication scheme based on trusted platform for Cl