Search scope:
排序: Display mode:
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers
Mukti PADHYA, Devesh C. JINWALA
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1717-1748 doi: 10.1631/FITEE.1800192
Keywords: Searchable encryption Cloud storage Key-aggregate encryption Data sharing
Constructing pairing-free certificateless public key encryption with keyword search Research Articles
Yang LU, Ji-guo LI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8, Pages 1049-1060 doi: 10.1631/FITEE.1700534
Keywords: Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Strategic Study of CAE 2004, Volume 6, Issue 10, Pages 32-38
As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.
Keywords: WLAN encryption WEP rekey
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
BORON: an ultra-lightweight and low power encryption design for pervasive computing Article
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3, Pages 317-331 doi: 10.1631/FITEE.1500415
Keywords: Lightweight cryptography SP network Block cipher Internet of Things (IoT) Encryption Embedded security
A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article
Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng
Engineering 2021, Volume 7, Issue 6, Pages 787-797 doi: 10.1016/j.eng.2021.03.011
Keywords: Information security Cloud-based design and manufacture Co-design CAD assembly models Attribute-based encryption
Research on overall encryption adjustment technology of offshore oil field
Zhang Fengjiu,Luo Xianbo,Liu Yingxian,Zhao Chunming
Strategic Study of CAE 2011, Volume 13, Issue 5, Pages 34-40
Take SZ36-1 oilfield as an example, offshore fields of heavy oil have stepped into later stage in development life and revealed problems gradually for serious injection/production contradiction, big variation for producing reserves in interlayer and plane, much higher for well-controlled reserves, lower for both of oil production rate and oil recovery, changing fast for composite water cut rising and production decline. In view of the challenge for development of offshore fields of heavy oil in China, we put forward the study of comprehensive adjustment for offshore fields in large scale firstly. Because of the special development mode of offshore fields, the proven research thinking and technical route for comprehensive adjustment used by onshore oilfields could not be copied to offshore fields. The research technology of comprehensive adjustment for integral well pattern thickening faces many technical difficulties, so now this research makes a combination of self-characteristics and development mode of SZ36-1 oilfield to put forward a full suite of research thinking and research methods for integral potential tapping and adjustment, and the proposal of comprehensive adjustment for integral well pattern thickening in SZ36-1 oilfield phase I. A water injection well pattern of inverted nine spot is transformed into a well pattern of line drive after pattern adjustment to try a development modes of "direction well & horizontal well network" . The implementation effect of integral well pattern thickening makes a good effect for greatly improved state of water flooding, improved from 80.5 % before adjustment to 91.3 % after adjustment for producing degree of water flooding, forecasting greatly improved recovery for 10.4 %. The technique of adjustment for integral well pattern thickening is sure to be popularized and applied among the similar oilfields.
Keywords: heavy oil overall encryption well pattern adjustment water flooding simulation
Xiaojie Sui, Xiaodong Wang, Chengcheng Cai, Junyi Ma, Jing Yang, Lei Zhang
Engineering 2023, Volume 23, Issue 4, Pages 82-89 doi: 10.1016/j.eng.2022.03.021
Keywords: Freeze-tolerant hydrogels Aggregation-induced emission Encryption Decryption Anticounterfeiting
Generic user revocation systems for attribute-based encryption in cloud storage None
Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11, Pages 1362-1384 doi: 10.1631/FITEE.1800405
Keywords: Attribute-based encryption Generic user revocation User privacy Cloud storage Access control
Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2, Pages 258-277 doi: 10.1631/FITEE.2000366
Keywords: Post-quantum cryptography Threshold proxy re-encryption Lattices Robustness Decentralization
Generic attribute revocation systems for attribute-based encryption in cloud storage Research Papers
Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6, Pages 773-786 doi: 10.1631/FITEE.1800512
Attribute-based encryption (ABE) has been a preferred encryption technology to solve the problems
Keywords: Attribute-based encryption Generic attribute revocation User privacy Cloud storage Access control
Aleakage-resilient certificateless public key encryption scheme withCCA2security None
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4, Pages 481-493 doi: 10.1631/FITEE.1601849
Keywords: Certificateless public-key encryption Leakage-resilience Provable security CCA2 security Decisional Diffie-Hellman
The Value Added Tax Anti-Fake and Control System and Its Security Design
Wei Qingfu
Strategic Study of CAE 2000, Volume 2, Issue 11, Pages 84-87
As an especial commercial encryption application, the system must work properly under all kindssecurity design technique according to the secure model for the system in respect of the kernel hardware, encryption
Keywords: value-added tax anti-fake encryption security
Frontiers of Chemical Science and Engineering 2023, Volume 17, Issue 7, Pages 966-975 doi: 10.1007/s11705-022-2244-1
Keywords: alkali lignin red light carbon dots hypochlorite encryption and anti-counterfeiting
ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1, Pages 28-42 doi: 10.1631/FITEE.1400133
Keywords: Storage image security Cryptographic file system Filesystem in userspace (FUSE) Transparent encryption
Title Author Date Type Operation
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data
Mukti PADHYA, Devesh C. JINWALA
Journal Article
Constructing pairing-free certificateless public key encryption with keyword search
Yang LU, Ji-guo LI
Journal Article
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Journal Article
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article
BORON: an ultra-lightweight and low power encryption design for pervasive computing
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Journal Article
A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models
Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng
Journal Article
Research on overall encryption adjustment technology of offshore oil field
Zhang Fengjiu,Luo Xianbo,Liu Yingxian,Zhao Chunming
Journal Article
AIE-Active Freeze-Tolerant Hydrogels Enable Multistage Information Encryption and Decryption at Subzero
Xiaojie Sui, Xiaodong Wang, Chengcheng Cai, Junyi Ma, Jing Yang, Lei Zhang
Journal Article
Generic user revocation systems for attribute-based encryption in cloud storage
Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI
Journal Article
Identity-based threshold proxy re-encryption scheme from lattices and its applications
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Journal Article
Generic attribute revocation systems for attribute-based encryption in cloud storage
Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG
Journal Article
Aleakage-resilient certificateless public key encryption scheme withCCA2security
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Journal Article
Lignin-derived dual-function red light carbon dots for hypochlorite detection and anti-counterfeiting
Journal Article