45   Artículos

 
en línea
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao    
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mengchi Xing, Haojiang Deng and Rui Han    
The 5G core network adopts a Control and User Plane Separation (CUPS) architecture to meet the challenges of low-latency business requirements. In this architecture, a balance between management costs and User Experience (UE) is achieved by moving User P... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Qiang Li    
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication tr... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Athanasios Goudosis and Sokratis Katsikas    
The automatic identification system (AIS), despite its importance in worldwide navigation at sea, does not provide any defence mechanisms against deliberate misuse, e.g., by sea pirates, terrorists, business adversaries, or smugglers. Previous work has p... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Qihong Yu, Jiguo Li and Sai Ji    
In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the security of cryptographic systems. Since no existing anonymous broadcast encryption scheme can resist the si... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Luisanna Cocco, Roberto Tonelli and Michele Marchesi    
This work presents a Self Sovereign Identity based system proposal to show how Blockchain, Building Information Modeling, Internet of Thing devices, and Self Sovereign Identity concepts can support the process of building digitalization, guaranteeing the... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Athanasios Goudosis and Sokratis Katsikas    
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such i... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Qingnan Chen, Ting Wu, Chengnan Hu, Anbang Chen and Qiuhua Zheng    
Cross-domain authenticated asymmetric group key agreement allows group members in different domains to establish a secure group communication channel and the senders can be anyone. However, the existing schemes do not meet the requirement of batch verifi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hanae Mgarbi,Mohamed Yassin Chkouri,Abderrahim Tahiri     Pág. 37 - 42
Before the development of the web, we talk about the portfolio; it was represented by a simple portfolio of student skills in paper form. This form of representation of skills and professional career has continued to develop over the years. After a succe... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »