In this paper, we introduce the Maximum Distance Sublattice Problem (MDSP). We observed that the problem of solving an instance of the Closest Vector Problem (CVP) in a lattice L is the same as solving an instance of ...
详细信息
This letter presents a novel method to enable beam steering optimization for secure communications and resilience against radio tracking in an intelligent reflecting surfaces-enabled multiple-input multiple-output dua...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the critical *** to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in ***,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key *** paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy *** addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key *** the main computation task is outsourced to the cloud,the burden of the user side is relatively *** of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
The medical domain faces unique challenges in information Retrieval (IR) due to the complexity of medical language and terminology discrepancies between user queries and documents. While traditional Keyword-Based Meth...
详细信息
With the growth of the World Wide Web, a large amount of music data is available on the Internet. A large number of people listen to music online rather than downloading and listening offline. But only some sites prov...
详细信息
Portfolio Management is an asset management technique where funds are continuously allocated and reallocated to obtain maximum gain with minimal risk. Constructing an efficient portfolio model is very challenging sinc...
详细信息
The security of biomedical signals is the highest priority of any medical or clinical setup. The electrocardiogram (ECG) signals are very crucial in assessing heart health and their security is of utmost importance. A...
详细信息
Research in terms of security in vehicular architecture has been a focal point of deliberation in the automotive sector. The Automotive industry development has continuously evolved the scenario of adding more integra...
详细信息
In domain adaptation, the goal is to train a neural network on the source domain and obtain a good accuracy on the target domain. In such a scenario, it is important to transfer the knowledge from the labelled source ...
详细信息
Prevention of insider threats is challenging as credible associates of the organisation are involved and have access to confidential information. User behaviour modelling is crucial for detecting these anomalies. The ...
详细信息
暂无评论