|
|
|
Tao Feng, Dewei Wang and Renbin Gong
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine...
ver más
|
|
|
|
|
|
|
Yarajarla Nagasree, Chiramdasu Rupa, Ponugumati Akshitha, Gautam Srivastava, Thippa Reddy Gadekallu and Kuruva Lakshmanna
Privacy preservation of image data has been a top priority for many applications. The rapid growth of technology has increased the possibility of creating fake images using social media as a platform. However, many people, including researchers, rely on ...
ver más
|
|
|
|
|
|
|
Beibei Song, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu and Chuansheng Wang
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing th...
ver más
|
|
|
|
|
|
|
Yongbo Jiang, Yuan Zhou and Tao Feng
At present, secure multi-party computing is an effective solution for organizations and institutions that want to derive greater value and benefit from the collaborative computing of their data. Most current secure multi-party computing solutions use enc...
ver más
|
|
|
|
|
|
|
Nikos Fotiou and George C. Polyzos
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that s...
ver más
|
|
|
|