CSpace

浏览/检索结果: 共5条,第1-5条 帮助

限定条件                        
已选(0)清除 条数/页:   排序方式:
Making Information Hiding Effective Again 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:  Wang, Zhe;  Wu, Chenggang;  Zhang, Yinqian;  Tang, Bowen;  Yew, Pen-Chung;  Xie, Mengyao;  Lai, Yuanming;  Kang, Yan;  Cheng, Yueqiang;  Shi, Zhiping
收藏  |  浏览/下载:19/0  |  提交时间:2022/12/07
Instruction sets  Registers  Computer crashes  Entropy  Kernel  Security  Probes  Side channel attacks  information hiding  intra-process memory isolation  TLB misses  
A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2022, 卷号: 9, 期号: 11, 页码: 8154-8167
作者:  Yu, Keping;  Tan, Liang;  Yang, Caixia;  Choo, Kim-Kwang Raymond;  Bashir, Ali Kashif;  Rodrigues, Joel J. P. C.;  Sato, Takuro
收藏  |  浏览/下载:19/0  |  提交时间:2022/12/07
Industrial Internet of Things  Security  Cloud computing  Blockchains  Encryption  Edge computing  Logic gates  Blockchain  data protection  Industrial Internet of Things (IIoT)  Shamir secret sharing (SSS)  
ATOM: Architectural Support and Optimization Mechanism for Smart Contract Fast Update and Execution in Blockchain-Based IoT 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2022, 卷号: 9, 期号: 11, 页码: 7959-7971
作者:  Li, Tao;  Fang, Yaozheng;  Jian, Zhaolong;  Xie, Xueshuo;  Lu, Ye;  Wang, Guiling
收藏  |  浏览/下载:18/0  |  提交时间:2022/12/07
Ethereum virtual machine (EVM)  smart contract  
A differentially private indoor localization scheme with fusion of WiFi and bluetooth fingerprints in edge computing 期刊论文
NEURAL COMPUTING & APPLICATIONS, 2022, 页码: 22
作者:  Zhang, Xuejun;  He, Fucun;  Chen, Qian;  Jiang, Xinlong;  Bao, Junda;  Ren, Tongwei;  Du, Xiaogang
收藏  |  浏览/下载:19/0  |  提交时间:2022/12/07
Location privacy  Edge computing  Differential privacy  Fusion semi-supervised extreme learning machine  Indoor localization  
Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach 期刊论文
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 卷号: 9, 期号: 1, 页码: 271-281
作者:  Tan, Liang;  Yu, Keping;  Shi, Na;  Yang, Caixia;  Wei, Wei;  Lu, Huimin
收藏  |  浏览/下载:18/0  |  提交时间:2022/12/07
COVID-19  Blockchains  Encryption  Privacy  Hospitals  Outsourcing  Authorization  Blockchain  security and privacy protection  traceable and revocation  COVID-19  electronic medical records