|
|
|
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc...
ver más
|
|
|
|
|
|
|
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w...
ver más
|
|
|
|
|
|
|
Na Wei, Yuxin Peng, Kunming Lu, Guixing Zhou, Xingtao Guo and Minghui Niu
The parallel reservoirs in the upper reach of the Hanjiang River are key projects for watershed management, development, and protection. The optimal operation of parallel reservoirs is a multiple-stage, multiple-objective, and multiple-decision attribute...
ver más
|
|
|
|
|
|
|
Dirk H. R. Spennemann
Cultural heritage management at the local government level relies on community participation, mainly interested stakeholders, in the identification, nomination and, in some jurisdictions, the co-evaluation of heritage assets. These are then ?listed,? i.e...
ver más
|
|
|
|
|
|
|
Yiming Zhu, Dehua Zhou, Yuan Li, Beibei Song and Chuansheng Wang
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes. Keyword frequency analysis is a powerful tool f...
ver más
|
|
|
|
|
|
|
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce...
ver más
|
|
|
|
|
|
|
Yongli Tang, Deng Pan, Panke Qin and Liping Lv
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks. Group signature is regarde...
ver más
|
|
|
|
|
|
|
Yan Cui and Wenbo Fang
Under the current urban renewal background, the subjective attitude of stakeholders directly affects the feasibility of planning projects in the development or protection activities related to brownfield redevelopment. It is key that the public effective...
ver más
|
|
|
|
|
|
|
Bimal Kumar Roy and Anandarup Roy
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th...
ver más
|
|
|
|
|
|
|
Zeeshan Ashraf, Zahid Mahmood and Muddesar Iqbal
The advancement and innovations in wireless communication technologies including the Internet of Things have massively changed the paradigms of health-based services. In particular, during the COVID-19 pandemic, the trends of working from home have been ...
ver más
|
|
|
|