|
|
|
Shaonan Hou, Chengjun Lin and Shaojun Yang
A transitive signature scheme enables anyone to obtain the signature on edge (??,??)
(
i
,
k
)
by combining the signatures on edges (??,??)
(
i
,
j
)
and (??,??)
(
j
,
k
)
, but it suffers from signature theft and signature abuse. The existing work has...
ver más
|
|
|
|
|
|
Ahmed A. Abdullah, B. M. El-den, Khaled M. Abo-Al-Ez and Tarek M. Hassan
Advanced Metering Infrastructure (AMI) plays a crucial role in enabling the efficient functioning of Smart Electrical Grids, but its successful implementation hinges on robust cybersecurity measures. To uphold data confidentiality and integrity, the depl...
ver más
|
|
|
|
|
|
Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan and Mohammed Al-Khalidi
In today?s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time c...
ver más
|
|
|
|
|
|
Bowen He, Han Zheng and Qun Guan
This study examines the DCMA concerning the future risk of the water security status. We considered three risk factors: population growth, economic growth, and natural water supply?demand differences. In the risk analysis part, we consulted with experts ...
ver más
|
|
|
|
|
|
Rui-Hua Liu and Quan Zhou
With the increasing requirements for the security of medical data, military data, and other data transmission, data hiding technology has gradually developed from only protecting the security of secret data to all transmission data. As a necessary techni...
ver más
|
|
|