Resource Type

Journal Article 475

Conference Videos 25

Conference Information 2

Year

2024 1

2023 47

2022 40

2021 54

2020 27

2019 26

2018 28

2017 18

2016 24

2015 24

2014 14

2013 17

2012 14

2011 24

2010 19

2009 26

2008 11

2007 18

2006 12

2005 6

open ︾

Keywords

structure 12

Community structure 4

Microbial community structure 4

steel structure 4

Attribute-based encryption 3

Crystal structure 3

aircraft structure 3

durability 3

fatigue life 3

synthesis 3

ANSYS 2

Access control 2

Additive manufacturing 2

Block cipher 2

Cloud storage 2

Encryption 2

High-throughput sequencing 2

Porous structure 2

additive manufacturing 2

open ︾

Search scope:

排序: Display mode:

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Strategic Study of CAE 2004, Volume 6, Issue 10,   Pages 32-38

Abstract:

As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.

Keywords: WLAN     encryption     WEP     rekey    

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypted

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Searchable public key encryption enables a storage server to retrieve the publicly encrypted data withoutMotivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing    

Cyber Resilience Enabled by Endogenous Safety and Security: Vision, Techniques, and Strategies

Wu Jiangxing , Zou Hong , Xue Xiangyang , Zhang Fan , Shang Yuting

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 106-115 doi: 10.15302/J-SSCAE-2023.06.018

Abstract:

Cyber resiliency engineering is a technical approach embraced by countries and regions such as the United States and Europe to implement digital transformation and address network security challenges under new circumstances. It aims to keep the barriers to entry high for digital technologies based on the cyber resilience standard and to improve the digital infrastructure security capability of China from both the application service and device supply sides. This study focuses on the impact and challenges brought by the initiatives of cyber resiliency engineering in the United States and Europe on the development of new-generation network information technology in China. It starts from a concept introduction of resilience, cyber resilience, and cyber resiliency engineering. Subsequently, it elaborates on the application progress of cyber resiliency engineering in the United States and Europe in terms of policy drivers, strategic considerations, and development dilemmas. Moreover, the study goes further to propose a dynamic heterogeneous redundancy architecture based on an endogenous security and safety (ESS) theory. It describes and illustrates the intrinsic mechanism, basic concepts, and application methods of cyber resilience empowered by ESS. Furthermore, we propose that China should accelerate innovation to offset the combined effects of cyber resiliency engineering in developed countries, introduce a cyber resilience policy and law system with Chinese characteristics, establish corresponding regulatory systems to clarify the network security responsibilities, establish a quantifiable, verifiable, and credible testing and evaluation system, and  boost the holistic implementation of cyber resilience with a multi-pronged approach including financial marketization, hoping to  ystematically enhance the cyber resilience and strength of China.

Keywords: cyberspace     endogenous safety and security     cyber resilience     structure encryption     dynamic heterogeneous    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryptionTo reduce the message-ciphertext expansion factor of the proposed scheme to log , the encryption algorithmof this scheme is built based on Gentry’s encryption scheme, by which m bits of plaintext are encryptedinto m log q bits of ciphertext by a one time encryption operation.

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

BORON: an ultra-lightweight and low power encryption design for pervasive computing Article

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3,   Pages 317-331 doi: 10.1631/FITEE.1500415

Abstract: BORON has a compact structure which requires 1939 gate equivalents (GEs) for a 128-bit key and 1626 GEs

Keywords: Lightweight cryptography     SP network     Block cipher     Internet of Things (IoT)     Encryption     Embedded security    

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Engineering 2021, Volume 7, Issue 6,   Pages 787-797 doi: 10.1016/j.eng.2021.03.011

Abstract: This paper presents a novel attribute-based encryption (ABE) approach for computer-aided design (CAD)An assembly hierarchy access tree (AHAT) is designed as the hierarchical access structure.The proposed encryption scheme is demonstrated to be secure under the standard assumption.

Keywords: Information security     Cloud-based design and manufacture     Co-design     CAD assembly models     Attribute-based encryption    

Research on overall encryption adjustment technology of offshore oil field

Zhang Fengjiu,Luo Xianbo,Liu Yingxian,Zhao Chunming

Strategic Study of CAE 2011, Volume 13, Issue 5,   Pages 34-40

Abstract:

Take SZ36-1 oilfield as an example, offshore fields of heavy oil have stepped into later stage in development life and revealed problems gradually for serious injection/production contradiction, big variation for producing reserves in interlayer and plane, much higher for well-controlled reserves, lower for both of oil production rate and oil recovery, changing fast for composite water cut rising and production decline. In view of the challenge for development of offshore fields of heavy oil in China, we put forward the study of comprehensive adjustment for offshore fields in large scale firstly. Because of the special development mode of offshore fields, the proven research thinking and technical route for comprehensive adjustment used by onshore oilfields could not be copied to offshore fields. The research technology of comprehensive adjustment for integral well pattern thickening faces many technical difficulties, so now this research makes a combination of self-characteristics and development mode of SZ36-1 oilfield to put forward a full suite of research thinking and research methods for integral potential tapping and adjustment, and the proposal of comprehensive adjustment for integral well pattern thickening in SZ36-1 oilfield phase I. A water injection well pattern of inverted nine spot is transformed into a well pattern of line drive after pattern adjustment to try a development modes of "direction well & horizontal well network" . The implementation effect of integral well pattern thickening makes a good effect for greatly improved state of water flooding, improved from 80.5 % before adjustment to 91.3 % after adjustment for producing degree of water flooding, forecasting greatly improved recovery for 10.4 %. The technique of adjustment for integral well pattern thickening is sure to be popularized and applied among the similar oilfields.

Keywords: heavy oil     overall encryption     well pattern adjustment     water flooding     simulation    

AIE-Active Freeze-Tolerant Hydrogels Enable Multistage Information Encryption and Decryption at Subzero Article

Xiaojie Sui, Xiaodong Wang, Chengcheng Cai, Junyi Ma, Jing Yang, Lei Zhang

Engineering 2023, Volume 23, Issue 4,   Pages 82-89 doi: 10.1016/j.eng.2022.03.021

Abstract: aggregation-induced emission (AIE)-active freeze-tolerant hydrogels are developed, which enable information encryptionluminogens presents turn-off/-on fluorescence, thereby enabling the use of these hydrogels for information encryption

Keywords: Freeze-tolerant hydrogels     Aggregation-induced emission     Encryption     Decryption     Anticounterfeiting    

Generic user revocation systems for attribute-based encryption in cloud storage None

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11,   Pages 1362-1384 doi: 10.1631/FITEE.1800405

Abstract: Attribute-based encryption (ABE) not only protects data secrecy, but also has ciphertexts or decryptiongeneric user revocation systems for ABE with user privacy protection, user revocation via ciphertext re-encryption

Keywords: Attribute-based encryption     Generic user revocation     User privacy     Cloud storage     Access control    

Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2,   Pages 258-277 doi: 10.1631/FITEE.2000366

Abstract: the delegator‘s private key information, but also decentralizes the proxy power by splitting the re-encryption

Keywords: Post-quantum cryptography     Threshold proxy re-encryption     Lattices     Robustness     Decentralization    

Generic attribute revocation systems for attribute-based encryption in cloud storage Research Papers

Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 773-786 doi: 10.1631/FITEE.1800512

Abstract:

Attribute-based encryption (ABE) has been a preferred encryption technology to solve the problems

Keywords: Attribute-based encryption     Generic attribute revocation     User privacy     Cloud storage     Access control    

Aleakage-resilient certificateless public key encryption scheme withCCA2security None

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 481-493 doi: 10.1631/FITEE.1601849

Abstract: construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificateless public-key encryption

Keywords: Certificateless public-key encryption     Leakage-resilience     Provable security     CCA2 security     Decisional Diffie-Hellman    

The Value Added Tax Anti-Fake and Control System and Its Security Design

Wei Qingfu

Strategic Study of CAE 2000, Volume 2, Issue 11,   Pages 84-87

Abstract: A special data encryption mechanism is adopted in the system to implement the detection and countercheck

As an especial commercial encryption application, the system must work properly under all kindssecurity design technique according to the secure model for the system in respect of the kernel hardware, encryption

Keywords: value-added tax     anti-fake     encryption     security    

Lignin-derived dual-function red light carbon dots for hypochlorite detection and anti-counterfeiting

Frontiers of Chemical Science and Engineering 2023, Volume 17, Issue 7,   Pages 966-975 doi: 10.1007/s11705-022-2244-1

Abstract: Furthermore, a new type of visible-light and fluorescence dual-channel information encryption platformLow-concentration hypochlorite can be employed as an accessible and efficient information encryption/

Keywords: alkali lignin     red light carbon dots     hypochlorite     encryption and anti-counterfeiting    

Title Author Date Type Operation

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

Cyber Resilience Enabled by Endogenous Safety and Security: Vision, Techniques, and Strategies

Wu Jiangxing , Zou Hong , Xue Xiangyang , Zhang Fan , Shang Yuting

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

BORON: an ultra-lightweight and low power encryption design for pervasive computing

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Journal Article

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Journal Article

Research on overall encryption adjustment technology of offshore oil field

Zhang Fengjiu,Luo Xianbo,Liu Yingxian,Zhao Chunming

Journal Article

AIE-Active Freeze-Tolerant Hydrogels Enable Multistage Information Encryption and Decryption at Subzero

Xiaojie Sui, Xiaodong Wang, Chengcheng Cai, Junyi Ma, Jing Yang, Lei Zhang

Journal Article

Generic user revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI

Journal Article

Identity-based threshold proxy re-encryption scheme from lattices and its applications

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Journal Article

Generic attribute revocation systems for attribute-based encryption in cloud storage

Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG

Journal Article

Aleakage-resilient certificateless public key encryption scheme withCCA2security

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Journal Article

The Value Added Tax Anti-Fake and Control System and Its Security Design

Wei Qingfu

Journal Article

Lignin-derived dual-function red light carbon dots for hypochlorite detection and anti-counterfeiting

Journal Article