Smart contracts are self-executing programs running in the blockchain allowing for decentralised storage and execution without a ***-chain execution is expensive,with miners charging fees for distributed execution acc...
详细信息
Smart contracts are self-executing programs running in the blockchain allowing for decentralised storage and execution without a ***-chain execution is expensive,with miners charging fees for distributed execution according to a cost model defined in the *** particular,transactions have a high fixed *** present MultiCall,a transaction-batching interpreter for Ethereum that reduces the cost of smart contract executions by gathering multiple users’transactions into a *** current implementation of MultiCall includes the following features:the ability to emulate Ethereum calls and create transactions,both from MultiCall itself and using an identity unique to the user;the ability to cheaply pay Ether to other MultiCall users;and the ability to authorise emulated transactions on behalf of multiple users in a single transaction using hash-based authorisation rather than more expensive *** improves upon a previous version of *** experiments show that MultiCall provides a saving between 57%and 99%of the fixed transaction cost compared with the standard approach of sending Ethereum transactions directly.
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be *** scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and *** begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction *** these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this *** traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum *** addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum ***,security analysis and performance evaluation of our protocol are discussed.
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple...
详细信息
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users,and even return the top-k most relevant search results when *** refer to a model that satisfies all of the conditions a 3-multi ranked search ***,SE schemes that have been proposed to date use fully trusted trapdoor generation centers,and several methods assume a secure connection between the data users and a trapdoor generation *** is,they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords,but it will never attempt to use it in any other manner than that requested,which is impractical in real *** this study,to enhance the security,we propose a new 3-multi ranked SE scheme that satisfies all conditions without these security *** proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center,thereby preventing attackers from determining whether two different queries include the same ***,we develop a method for managing multiple encrypted keywords from every data owner,each encrypted with a different *** evaluation demonstrates that,despite the trade-off overhead that results from the weaker security assumption,the proposed scheme achieves reasonable performance compared to extant schemes,which implies that our scheme is practical and closest to real life.
Alzheimer's disease has become a significant contemporary health concern, impacting approximately 45 million individuals. This degenerative brain condition, prevalent among the elderly, lacks a well-defined etiolo...
详细信息
This paper presents a novel image-level anomaly detection control method for defect inspection, which comprises featureextraction from high-dimensional data and feature-learning to analyze the observed patterns. we fo...
详细信息
In response to the challenges posed by complex and hard-to-remember passwords in traditional authentication systems, this research introduces an innovative approach leveraging Low Rank Adaption (LoRA) fine-tuned Large...
详细信息
In recent years, Large Language Models (LLMs) have emerged as transformative tools in natural language processing (NLP) and artificial intelligence (AI) *** excel in generating coherent and contextually relevant text ...
详细信息
The Ocular diseases are progressive and patients are unaware they have a disease it is better to recognize it and cure it before it is too *** earlier proposed model aims to use a single CNN architecture such as Dense...
详细信息
Significant progress has been made throughout the detection of Diabetic Retinopathy (DR) over the past few decades because of the utilization of Deep-Learning (DL) techniques. Accurate and economical identification of...
详细信息
Three-dimensional (3D) human pose tracking has recently attracted more and more attention in the computer vision field. Real-time pose tracking is highly useful in various domains such as video surveillance, somatosen...
详细信息
Three-dimensional (3D) human pose tracking has recently attracted more and more attention in the computer vision field. Real-time pose tracking is highly useful in various domains such as video surveillance, somatosensory games, and human-computer interaction. However, vision-based pose tracking techniques usually raise privacy concerns, making human pose tracking without vision data usage an important problem. Thus, we propose using Radio Frequency Identification (RFID) as a pose tracking technique via a low-cost wearable sensing device. Although our prior work illustrated how deep learning could transfer RFID data into real-time human poses, generalization for different subjects remains challenging. This paper proposes a subject-adaptive technique to address this generalization problem. In the proposed system, termed Cycle-Pose, we leverage a cross-skeleton learning structure to improve the adaptability of the deep learning model to different human skeletons. Moreover, our novel cycle kinematic network is proposed for unpaired RFID and labeled pose data from different subjects. The Cycle-Pose system is implemented and evaluated by comparing its prototype with a traditional RFID pose tracking system. The experimental results demonstrate that Cycle-Pose can achieve lower estimation error and better subject generalization than the traditional system.
暂无评论