The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare *** referral treatment for patients,the original signature needs to be con...
详细信息
The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare *** referral treatment for patients,the original signature needs to be converted into a re-signature that can be verified by the new *** re-signature(PRS)can be applied to this scenario so that authenticity and nonrepudiation can still be insured for ***,the existing PRS schemes cannot realize forward and backward ***,this paper proposes the first PRS scheme that can provide key-insulated property,which can guarantee both the forward and backward security of the *** the leakage of the private key occurs at a certain moment,the forward and backward key will not be ***,the purpose of key insulation is ***’s more,it can update different corresponding private keys in infinite time periods without changing the identity information of the user as the public ***,the unforgeability of our scheme is proved based on the extended Computational Diffie-Hellman assumption in the random oracle ***,the experimental simulation demonstrates that our scheme is feasible and in possession of promising properties.
作者:
Lu, LinZou, Qingzhi
Key Laboratory of Computing Power Network and Information Se-curity Ministry of Education Shandong Computer Science Center Jinan China
Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks
Shandong Fundamental Research Center for Computer Science Jinan China
Due to the exceptional performance of Transform-ers in 2D medical image segmentation, recent work has also introduced them into 3D medical segmentation tasks. For instance, Swin UNETR and other hierarchical Transforme...
详细信息
In this paper, the problem of collaborative vehicle sensing is investigated. In the considered model, a set of cooperative vehicles provide sensing information to sensing request vehicles with limited sensing and comm...
详细信息
Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using a...
详细信息
Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using audio-based location distinction *** the proposed scheme,traditional cryptographic techniques,such as symmetric encryption algorithm,RSA-based signcryption scheme,and audio-based secure transmission,are utilized to provide authentication,non-repudiation,and confidentiality in the information interaction of the management ***,an audio-based location distinction method is designed to detect the position change of the ***,the audio frequency response(AFR)of several frequency points is utilized as a device *** device signature has the features as follows.(1)Hardware Signature:different pairs of speaker and microphone have different signatures;(2)Distance Signature:in the same direction,the signatures are different at different distances;and(3)Direction Signature:at the same distance,the signatures are different in different *** on the features above,amovement detection algorithmfor device identification and location distinction is ***,a secure communication protocol is also proposed by using traditional cryptographic techniques to provide integrity,authentication,and non-repudiation in the process of information interaction between devices,Access Points(APs),and *** experiments are conducted to evaluate the performance of the proposed *** experimental results show that the proposedmethod has a good performance in accuracy and energy consumption.
The aim of cross-modal image-text retrieval is to heighten comprehension and to create robust associations between visual and textual content. This process entails a mutual querying and synchronization across various ...
详细信息
Multiphase flows are of great importance for the sustainable utilization of geological resources and ecological protection. Numerical simulation, as a general and powerful approach for multiphase flow modeling, faces ...
详细信息
In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public *** to ensure the security of transmission,cultivate talents who combine medical imagin...
详细信息
In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public *** to ensure the security of transmission,cultivate talents who combine medical imaging and information security,and explore and cultivate new discipline growth points are difficult problems and challenges for schools and *** order to cope with industrial changes,a new round of scientific and technological revolution,and the challenges of the further development of artificial intelligence in medicine,this article will analyze the existing problems in the training of postgraduates in medical imaging information security by combining the actual conditions and characteristics of universities,and put forward countermeasures and suggestions to promote the progress of technology in universities.
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo...
详细信息
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud *** on cloud platforms usually have some subjective or objective attacks,which make the outsourced graph data in an insecure *** issue of privacy data protection has become an important obstacle to data sharing and *** to query outsourcing graph data safely and effectively has become the focus of *** query is a basic and frequently used operation in graph,and it will effectively promote the query range and query ability if multi-keyword fuzzy search can be supported at the same *** work proposes to protect the privacy information of outsourcing graph data by encryption,mainly studies the problem of multi-keyword fuzzy adjacency query,and puts forward a *** our scheme,we use the Bloom filter and encryption mechanism to build a secure index and query token,and adjacency queries are implemented through indexes and query tokens on the cloud *** proposed scheme is proved by formal analysis,and the performance and effectiveness of the scheme are illustrated by experimental *** research results of this work will provide solid theoretical and technical support for the further popularization and application of encrypted graph data processing technology.
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural networks (CNNs) adopt hierarchical feature representation, showcasing powerful ...
详细信息
network monitoring and measurement is an important part of realizing the network digital twin. However, it introduces the problem of high cost when obtaining the status data of physical networks. Therefore, to efficie...
详细信息
暂无评论