|
|
|
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc...
ver más
|
|
|
|
|
|
|
Christine Dewi, Danny Manongga, Hendry, Evangs Mailoa and Kristoko Dwi Hartomo
Face mask detection is a technological application that employs computer vision methodologies to ascertain the presence or absence of a face mask on an individual depicted in an image or video. This technology gained significant attention and adoption du...
ver más
|
|
|
|
|
|
|
Esraa Othman, Iva Cibilic, Vesna Posloncec-Petric and Dina Saadallah
Environmental noise is a major environmental concern in metropolitan cities. The rapid social and economic growth in the 20th century is not always accompanied by adequate land planning and environmental management measures. As a consequence of rapid urb...
ver más
|
|
|
|
|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|
|
|
|
Yuxing Wang, Nan Liu, Zhiwen Pan and Xiaohu You
Network slicing is a key technology for 5G networks, which divides the traditional physical network into multiple independent logical networks to meet the diverse requirements of end-users. This paper focuses on the resource allocation problem in the sce...
ver más
|
|
|
|
|
|
|
Ross Clarke, Luke McGuire, Mohamed Baza, Amar Rasheed and Maazen Alsabaan
The current traditional paper ballot voting schemes suffer from several limitations such as processing delays due to counting paper ballots, lack of transparency, and manipulation of the ballots. To solve these limitations, an electronic voting (e-voting...
ver más
|
|
|
|
|
|
|
Qiang Li
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication tr...
ver más
|
|
|
|
|
|
|
Pengxuan Wang, Yixi Wang, Weijun Gao, Tongyu Xu, Xindong Wei, Chunyan Shi, Zishu Qi and Li Bai
In cold regions, due o the impact of climatic conditions, the heat load in winter and the cooling load in summer are unbalanced. In the long-term operation of the ground-source heat pump (GSHP), the soil heat imbalance phenomenon has still not been succe...
ver más
|
|
|
|
|
|
|
Yiming Zhu, Dehua Zhou, Yuan Li, Beibei Song and Chuansheng Wang
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes. Keyword frequency analysis is a powerful tool f...
ver más
|
|
|
|
|
|
|
Xinxin Zhou, Yujie Chen, Yingying Li, Bingjie Liu and Zhaoyuan Yu
As a kind of first aid healthcare service, emergency medical services (EMSs) present high spatiotemporal sensitivity due to significant changes in the time-dependent urban environment. Taking full advantage of big spatiotemporal data to realize multiperi...
ver más
|
|
|
|