Resource Type

Journal Article 38

Conference Videos 1

Year

2023 8

2022 5

2021 7

2020 3

2019 3

2018 3

2017 2

2016 1

2015 1

2011 2

2009 1

2008 1

2004 1

2000 1

open ︾

Keywords

Encryption 4

Attribute-based encryption 3

Cloud storage 3

Access control 2

Block cipher 2

Blockchain 2

Decentralization 2

Embedded security 2

Internet of Things (IoT) 2

Lightweight cryptography 2

encryption 2

Adaptive watermarking 1

Aggregation-induced emission 1

Anonymity 1

Anticounterfeiting 1

Authenticated cipher 1

BaSO4 nanoparticles 1

BaSO4-PVB films 1

Bacteria attachment 1

open ︾

Search scope:

排序: Display mode:

ImgFS: a transparent cryptography for stored images using a filesystem in userspace

Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1,   Pages 28-42 doi: 10.1631/FITEE.1400133

Abstract: Real-time encryption and decryption of digital images stored on end-user devices is a challenging taskTraditional software encryption applications generally suffered from the expense of user convenience,To overcome these limitations, the concept of transparent encryption has been proposed.This type of encryption mechanism can be implemented most efficiently with kernel file systems.This paper describes the design and implementation of ImgFS, a fully transparent cryptographic file system

Keywords: Storage image security     Cryptographic file system     Filesystem in userspace (FUSE)     Transparent encryption    

Preparation of transparent BaSO

Le Fang, Qian Sun, Yong-Hong Duan, Jing Zhai, Dan Wang, Jie-Xin Wang

Frontiers of Chemical Science and Engineering 2021, Volume 15, Issue 4,   Pages 902-912 doi: 10.1007/s11705-020-1985-y

Abstract: To the best of our knowledge, the synthesis of transparent BaSO nanodispersions was rarely reported.Here, we firstly present a novel and efficient method to prepare transparent and stable BaSO nanodispersionsFurthermore, the transparent BaSO -polyvinyl butyral nanocomposite films with good X-ray shielding performanceWe believe that the stable BaSO nanodispersions may have a wide range of applications for transparent

Keywords: BaSO4 nanoparticles     rotating packed bed     transparent nanodispersions     BaSO4-PVB films    

Model test and discrete element method simulation of shield tunneling face stability in transparent clay

Huayang LEI, Yajie ZHANG, Yao HU, Yingnan LIU

Frontiers of Structural and Civil Engineering 2021, Volume 15, Issue 1,   Pages 147-166 doi: 10.1007/s11709-020-0704-6

Abstract: In this study, a transparent clay with properties similar to those of Tianjin clay is prepared and anew transparent clay model test apparatus is developed to overcome the “black box” problem in the traditionaltunneling face (failure mode, influence range, support force, and surface settlement) is investigated in transparentA series of transparent clay model tests is performed to investigate the active failure mode, influenceThe results show that the engineering characteristics of transparent clay are similar to those of soft

Keywords: shield tunneling face     stability     transparent clay     model test     numerical simulation    

Utilizing transparent and conductive SnO

Jing Gu, Hongtao Yu, Xie Quan, Shuo Chen, Junfeng Niu

Frontiers of Environmental Science & Engineering 2020, Volume 14, Issue 4, doi: 10.1007/s11783-020-1251-z

Abstract: . • Transparent and conductive SnO2 can pass light through and promote charge transport. • VO from SnO2Herein, by employing transparent and conductive SnO2 as electron mediator to pass light through and promoteIntroducing a transparent and conductive electron mediator to construct Z-scheme photocatalyst gives

Keywords: Z-scheme photocatalyst     Tin oxide     Electron mediator     Organic pollutant    

From resource sharing to service sharing: opportunities and challenges of transparent computing

Zhang Yaoxue,Zhou Yuezhi

Strategic Study of CAE 2009, Volume 11, Issue 8,   Pages 10-17

Abstract: This paper proposes a new computing paradigm, transparent computing, which aims for service sharing andpresents the concept, architecture and key technologies of transparent computing.Moreover, it also gives the prospect of the impact and future development of transparent computing.

Keywords: pervasive computing     resource sharing     service sharing     transparent computing    

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Strategic Study of CAE 2004, Volume 6, Issue 10,   Pages 32-38

Abstract:

As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.

Keywords: WLAN     encryption     WEP     rekey    

Transformation of Fibrous Membranes from Opaque to Transparent Under Mechanical Pressing Article

Chao Wang, Jing Zhao, Liu Liu, Peng Zhang, Xianfeng Wang, Jianyong Yu, Bin Ding

Engineering 2022, Volume 19, Issue 12,   Pages 84-92 doi: 10.1016/j.eng.2021.02.018

Abstract:

There is a great demand for transparent films, membranes, or substrates in the fields of intelligentThus, the development of transparent electrospun fibrous membranes is of great value.This work reports a simple and effective way to develop flexible and porous transparent fibrous membranesMoreover, this study demonstrated that transparent and conductive membranes can be fabricated based on

Keywords: Transparent     Electrospun fibrous membranes     Porous structure     Mechanical pressing     Conductivity    

Transparent exopolymer particles (TEPs)-associated protobiofilm: A neglected contributor to biofouling

Frontiers of Environmental Science & Engineering 2021, Volume 15, Issue 4, doi: 10.1007/s11783-020-1361-7

Abstract:

• Bacteria could easily and quickly attached onto TEP to form protobiofilms.

Keywords: Transparent exopolymer particles (TEPs)     TEP-protobiofilm     Bacteria attachment     Biofouling of membrane    

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypted

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

Solid-state-reaction fabrication and properties of a high-doping Nd:YAG transparent laser ceramic

WU Yusong, LI Jiang, PAN Yubai, LIU Wenbin, AN Liqiong, WANG Shiwei, GUO Jingkun

Frontiers of Chemical Science and Engineering 2008, Volume 2, Issue 3,   Pages 248-252 doi: 10.1007/s11705-008-0048-6

Abstract: High-quality neodymium-doped yttrium aluminum garnet (Nd:YAG) transparent ceramic (4.0 mole percent)

Keywords: neodymium-doped yttrium     maximum absorbed     microstructure     fluorescence lifetime     threshold    

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Searchable public key encryption enables a storage server to retrieve the publicly encrypted data withoutMotivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryptionTo reduce the message-ciphertext expansion factor of the proposed scheme to log , the encryption algorithmof this scheme is built based on Gentry’s encryption scheme, by which m bits of plaintext are encryptedinto m log q bits of ciphertext by a one time encryption operation.

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

Self-extinguishing and transparent epoxy resin modified by a phosphine oxide-containing bio-based derivative

Gang Tang, Ruiqing Zhao, Dan Deng, Yadong Yang, Depeng Chen, Bing Zhang, Xinliang Liu, Xiuyu Liu

Frontiers of Chemical Science and Engineering 2021, Volume 15, Issue 5,   Pages 1269-1280 doi: 10.1007/s11705-021-2042-1

Abstract: This study provides a renewable strategy for fabricating flame retardant and transparent epoxy thermoset

Keywords: epoxy resin     flame retardant     furan derivative     diphenylphosphine oxide    

BORON: an ultra-lightweight and low power encryption design for pervasive computing Article

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3,   Pages 317-331 doi: 10.1631/FITEE.1500415

Abstract: We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON has a compact structure which requires 1939 gate equivalents (GEs) for a 128-bit key and 1626 GEs for an 80-bit key. The BORON cipher includes shift operators, round permutation layers, and XOR operations. Its unique design helps generate a large number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipher. BORON shows good performance on both hardware and software platforms. BORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput as compared to other existing SP network ciphers. We also present the security analysis of BORON and its performance as an ultra-lightweight compact cipher. BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role.

Keywords: Lightweight cryptography     SP network     Block cipher     Internet of Things (IoT)     Encryption     Embedded security    

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Engineering 2021, Volume 7, Issue 6,   Pages 787-797 doi: 10.1016/j.eng.2021.03.011

Abstract: This paper presents a novel attribute-based encryption (ABE) approach for computer-aided design (CAD)The proposed encryption scheme is demonstrated to be secure under the standard assumption.

Keywords: Information security     Cloud-based design and manufacture     Co-design     CAD assembly models     Attribute-based encryption    

Title Author Date Type Operation

ImgFS: a transparent cryptography for stored images using a filesystem in userspace

Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN

Journal Article

Preparation of transparent BaSO

Le Fang, Qian Sun, Yong-Hong Duan, Jing Zhai, Dan Wang, Jie-Xin Wang

Journal Article

Model test and discrete element method simulation of shield tunneling face stability in transparent clay

Huayang LEI, Yajie ZHANG, Yao HU, Yingnan LIU

Journal Article

Utilizing transparent and conductive SnO

Jing Gu, Hongtao Yu, Xie Quan, Shuo Chen, Junfeng Niu

Journal Article

From resource sharing to service sharing: opportunities and challenges of transparent computing

Zhang Yaoxue,Zhou Yuezhi

Journal Article

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Journal Article

Transformation of Fibrous Membranes from Opaque to Transparent Under Mechanical Pressing

Chao Wang, Jing Zhao, Liu Liu, Peng Zhang, Xianfeng Wang, Jianyong Yu, Bin Ding

Journal Article

Transparent exopolymer particles (TEPs)-associated protobiofilm: A neglected contributor to biofouling

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

Solid-state-reaction fabrication and properties of a high-doping Nd:YAG transparent laser ceramic

WU Yusong, LI Jiang, PAN Yubai, LIU Wenbin, AN Liqiong, WANG Shiwei, GUO Jingkun

Journal Article

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

Self-extinguishing and transparent epoxy resin modified by a phosphine oxide-containing bio-based derivative

Gang Tang, Ruiqing Zhao, Dan Deng, Yadong Yang, Depeng Chen, Bing Zhang, Xinliang Liu, Xiuyu Liu

Journal Article

BORON: an ultra-lightweight and low power encryption design for pervasive computing

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Journal Article

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Journal Article