Search scope:
排序: Display mode:
Generic attribute revocation systems for attribute-based encryption in cloud storage Research Papers
Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6, Pages 773-786 doi: 10.1631/FITEE.1800512
Attribute-based encryption (ABE) has been a preferred encryption technology to solve the problemsHowever, ABE schemes have practical limitations on dynamic attribute revocation.We propose a generic attribute revocation system for ABE with user privacy protection.The attribute revocation ABE (AR-ABE) system can work with any type of ABE scheme to dynamically revoke
Keywords: Attribute-based encryption Generic attribute revocation User privacy Cloud storage Access control
Generic user revocation systems for attribute-based encryption in cloud storage None
Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 11, Pages 1362-1384 doi: 10.1631/FITEE.1800405
Cloud-based storage is a service model for businesses and individual users that involves paid or freeAttribute-based encryption (ABE) not only protects data secrecy, but also has ciphertexts or decryptiongeneric user revocation systems for ABE with user privacy protection, user revocation via ciphertext re-encryption
Keywords: Attribute-based encryption Generic user revocation User privacy Cloud storage Access control
A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article
Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng
Engineering 2021, Volume 7, Issue 6, Pages 787-797 doi: 10.1016/j.eng.2021.03.011
Keywords: Information security Cloud-based design and manufacture Co-design CAD assembly models Attribute-basedencryption
A quantitative attribute-based benchmark methodology for single-target visual tracking Article
Wen-jing KANG, Chang LIU, Gong-liang LIU
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 3, Pages 405-421 doi: 10.1631/FITEE.1900245
Keywords: Visual tracking Performance evaluation Visual attributes Computer vision
Reduction of rough set attribute based on immune clone selection
LIANG Lin, XU Guang-hua
Frontiers of Mechanical Engineering 2006, Volume 1, Issue 4, Pages 413-417 doi: 10.1007/s11465-006-0049-4
Keywords: inherent distribution maturation evolution diversity antibody
A multi-attribute decision making approach of mix design based on experimental soil characterization
Amit K. BERA, Tanmoy MUKHOPADHYAY, Ponnada J. MOHAN, Tushar K. DEY
Frontiers of Structural and Civil Engineering 2018, Volume 12, Issue 3, Pages 361-371 doi: 10.1007/s11709-017-0425-7
Keywords: silty sand bentonite soil soil mix design multi-attribute decision making
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
The engineering analysis of the multidimensional attribute
Xu Changshan,Qu Lei
Strategic Study of CAE 2013, Volume 15, Issue 11, Pages 92-96
Engineering as a activity which people change nature and construction of artificial nature, has multidimensional attributes which include: stage, integrity, dynamics, contradictoriness, innovation, openness, humanity, risk, ethics and value. The research of the engineering,we should inspect the multidimensional attributes of engineering,and devote to explain in philosophical. So, people can understand and engage in engineering activities better than before.
Keywords: engineering multidimensional attribute
Attribute reduction in interval-valued information systems based on information entropies Article
Jian-hua DAI,Hu HU,Guo-jie ZHENG,Qing-hua HU,Hui-feng HAN,Hong SHI
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 9, Pages 919-928 doi: 10.1631/FITEE.1500447
Keywords: Rough set theory Interval-valued data Attribute reduction Entropy
Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2, Pages 258-277 doi: 10.1631/FITEE.2000366
Keywords: Post-quantum cryptography Threshold proxy re-encryption Lattices Robustness Decentralization
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Strategic Study of CAE 2004, Volume 6, Issue 10, Pages 32-38
As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.
Keywords: WLAN encryption WEP rekey
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers
Mukti PADHYA, Devesh C. JINWALA
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1717-1748 doi: 10.1631/FITEE.1800192
Keywords: Searchable encryption Cloud storage Key-aggregate encryption Data sharing
Study on the Multi-attribute Decision Model of Grey Target Based on Interval Number
Dang Yaoguo,Liu Sifeng,Liu Bin
Strategic Study of CAE 2005, Volume 7, Issue 8, Pages 31-35
Keywords: interval number grey target decision model application
Study on Grey Incidence Decision Model of the Dynamic Multiple-attribute
Dang Yaoguo,Liu Sifeng,Liu Bin,Tao Yong
Strategic Study of CAE 2005, Volume 7, Issue 2, Pages 69-72
Based on the decision character of the dynamic multiple-attribute system, in initializing the attributeand negative ideal precept of each period, a new grey incidence decision model of the dynamic multi-attributeIn this model, the developing character of each attribute in the system is fully consider, and appliedAll of the above provide a scientific and applied decision method for the dynamic multiple - attribute
Keywords: grey incidence analysis multi-attribute decision model
Construction Project Investment Optimization Based on Genetic Algorithm
Chen Yaoming,Zhong Denghua,Fu Jinqiang
Strategic Study of CAE 2006, Volume 8, Issue 7, Pages 68-71
Keywords: project investment multi-attribute utility function genetic algorithms
Title Author Date Type Operation
Generic attribute revocation systems for attribute-based encryption in cloud storage
Genlang CHEN, Zhiqian XU, Jia-jian ZHANG, Guo-jun WANG, Hai JIANG, Miao-qing HUANG
Journal Article
Generic user revocation systems for attribute-based encryption in cloud storage
Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI
Journal Article
A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models
Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng
Journal Article
A quantitative attribute-based benchmark methodology for single-target visual tracking
Wen-jing KANG, Chang LIU, Gong-liang LIU
Journal Article
Reduction of rough set attribute based on immune clone selection
LIANG Lin, XU Guang-hua
Journal Article
A multi-attribute decision making approach of mix design based on experimental soil characterization
Amit K. BERA, Tanmoy MUKHOPADHYAY, Ponnada J. MOHAN, Tushar K. DEY
Journal Article
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article
Attribute reduction in interval-valued information systems based on information entropies
Jian-hua DAI,Hu HU,Guo-jie ZHENG,Qing-hua HU,Hui-feng HAN,Hong SHI
Journal Article
Identity-based threshold proxy re-encryption scheme from lattices and its applications
Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com
Journal Article
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Journal Article
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data
Mukti PADHYA, Devesh C. JINWALA
Journal Article
Study on the Multi-attribute Decision Model of Grey Target Based on Interval Number
Dang Yaoguo,Liu Sifeng,Liu Bin
Journal Article
Study on Grey Incidence Decision Model of the Dynamic Multiple-attribute
Dang Yaoguo,Liu Sifeng,Liu Bin,Tao Yong
Journal Article