To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE ...
详细信息
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE scheme is constructed from Green et al.’s identity-based proxy reencryption scheme by adding the time *** every time period,a time stamp authority generates a public key embedded with the current time stamp for each *** our protocol for the renting house system,the TIPRE scheme is the primary building block,and the blockchain platform serves instead of a trusted third party,such as a real estate agency between landlords and *** TIPRE scheme allows the landlord to change the lock key at each time period for *** blockchain platform allows the landlords and tenants to directly interact,and all of the interactions are recorded in the blockchain database to provide the desired security requirements,such as nonrepudiation and ***,we provide the secure analysis of our protocol and test its performance by implementing it in the MacBook Pro and the Intel Edison development platforms.
This paper addresses an effective issue of content-based image retrieval (CBIR) by presenting Fuzzy Hamming Distance (FHD). Firstly, the theory of FHD is introduced, which includes degree of difference and cardinality...
详细信息
Coverage enhancement is one of the hot research topics in wireless multimedia sensor net- works. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is propo...
详细信息
Coverage enhancement is one of the hot research topics in wireless multimedia sensor net- works. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is proposed in multimedia sensor networks on the basis of the model whose pitch angle and deviation angle can be adjusted. Based on the proposed elliptical cone sensing model, we can derive the coverage area of the node and calculate the optimal pitch angle according the information of monitoring area and the nodes, and then the deviation angle is optimized based on co-evolution al- gorithm, which eliminate the overlapped and blind sensing area effectively. A set of simulations demonstrate the ef- fectiveness of our algorithm in coverage ratio.
Semantic-based image retrieval bridges the gap between visual features and human understanding of image in the field of image retrieval. Image annotation is one important technology of image retrieval based on the sem...
详细信息
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym...
详细信息
ISBN:
(纸本)9783540725893
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult. In this paper, we identify access control requirements and propose a trust based access control framework for P2P file-sharing systems. The model integrates aspects of trust and recommendation, fairness based participation schemes and access control schemes.
Lie symmetry reduction of some truly "variable coefficient" wave equations which are singled out from a class of (1 + 1)-dimensional variable coefficient nonlinear wave equations with respect to one and two-dimen...
详细信息
Lie symmetry reduction of some truly "variable coefficient" wave equations which are singled out from a class of (1 + 1)-dimensional variable coefficient nonlinear wave equations with respect to one and two-dimensional algebras is carried out. Some classes of exact solutions of the investigated equations are found by means of both the reductions and some modern techniques such as additional equivalent transformations and hidden symmetries and so on. Conditional symmetries are also discussed.
This paper proposes a dependency tree-based SRL system with proper pruning and extensive feature engineering. Official evaluation on the CoNLL 2008 shared task shows that our system achieves 76.19 in labeled macro F1 ...
详细信息
作者:
Dong, JiayiWang, FeiFudan University
Shanghai Key Lab of Intelligent Information Processing School of Computer Science and Technology Shanghai China
Since single-cell RNA sequencing (scRNA-seq) has revolutionized the study of cellular dynamics, the construction of gene relationships based on dynamic information has attracted much attention. However, the sparsity a...
详细信息
Single-cell RNA sequencing (scRNA-seq) technology has emerged as a valuable tool for classifying cell types across various species, tissues, and environmental conditions, thereby advancing the field of life sciences. ...
详细信息
Cells serve as the fundamental building blocks of living organisms and necessitate the utilization of diverse microscopic imaging techniques for observation. Nevertheless, there exist numerous limitations within phase...
详细信息
暂无评论