Resource Type

Journal Article 361

Year

2023 41

2022 24

2021 26

2020 30

2019 28

2018 21

2017 25

2016 26

2015 21

2014 14

2013 12

2012 8

2011 17

2010 11

2009 14

2008 3

2007 12

2006 3

2005 2

2004 4

open ︾

Keywords

key technology 12

public health 9

China 6

COVID-19 5

key technologies 5

sustainability 4

2035 3

Attribute-based encryption 3

Cloud storage 3

emergency management 3

6G 2

Access control 2

Block cipher 2

Deep learning 2

Deep mining 2

Delphi method 2

Encryption 2

climate change 2

construction time 2

open ︾

Search scope:

排序: Display mode:

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Searchable public key encryption enables a storage server to retrieve the publicly encrypted data withoutCertificateless cryptography (CLC) is a novel cryptographic primitive that has many merits.in conventional public key cryptosystems.Motivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKSWe strictly prove that the scheme achieves keyword ciphertext indistinguishability against adaptive chosen-keyword

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing    

Aleakage-resilient certificateless public key encryption scheme withCCA2security None

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 481-493 doi: 10.1631/FITEE.1601849

Abstract: attention has been focused on designing provably secure cryptographic primitives in the presence of keyperformance, a new construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificatelesspublic-key encryption scheme is proposed, whose security is proved based on the hardness of the classicAccording to our analysis, our method can tolerate leakage attacks on the private key.from the corresponding ciphertext, and a key leakage ratio of 1/2 can be achieved.

Keywords: Certificateless public-key encryption     Leakage-resilience     Provable security     CCA2 security     Decisional Diffie-Hellman    

Erratum to: Efficient keyword search over graph-structured data based on minimal covered Erratum

Asieh Ghanbarpour, Abbas Niknafs, Hassan Naderi,naderi@iust.ac.ir

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6,   Pages 809-962 doi: 10.1631/FITEE.18e0133

Abstract: Unfortunately the second author’s name has been misspelt. It should be read: Abbas NIKNAFS.

Efficient keyword search over graph-structured data based on minimal covered Article

Asieh GHANBARPOUR, Khashayar NIKNAFS, Hassan NADERI

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 3,   Pages 448-464 doi: 10.1631/FITEE.1800133

Abstract: Keyword search is an alternative for structured languages in querying graph-structured data.A result to a keyword query is a connected structure covering all or part of the queried keywords.However, this needs a time-consuming search process, which is not appropriate for an interactive systemrecent works by confining the shape of results to examine their coverage and compactness during the searchsearch.

Keywords: Keyword search     Graph mining     Information retrieval     Database     Clique    

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypteddata with support for data owners to share an aggregate searchable key with a user delegating searchA user, in turn, is required to submit only one single aggregate trapdoor to the cloud to perform a keywordsearch across the shared set of data.Security analysis proves that MULKASE is secure against chosen message attacks and chosen keyword attacks

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

Current research, key performances and future development of search and rescue robots

LIU Jinguo, WANG Yuechao, LI Bin, MA Shugen

Frontiers of Mechanical Engineering 2007, Volume 2, Issue 4,   Pages 404-416 doi: 10.1007/s11465-007-0070-2

Abstract: Search and rescue (SAR) robots can not only improve the efficiency of rescue operations but also reduceSearch and rescue robots will play a more and more important role in the rescue operations.A survey of the research status of search and rescue robots in Japan, USA, China and other countriesAccording to current research, experiences and the lessons learned from applications, the five key performancesDisaster prevention, disaster reduction and disaster rescue are the important parts of national public

Keywords: national development     communicability     mobility     national     intelligent network    

Finding map regions with high density of query keywords Article

Zhi YU, Can WANG, Jia-jun BU, Xia HU, Zhe WANG, Jia-he JIN

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10,   Pages 1543-1555 doi: 10.1631/FITEE.1600043

Abstract: This region search problem can be applied in many practical scenarios such as shopping recommendationWhile conventional map search retrieves isolate locations in a map, users frequently attempt to findIn this paper, we present a novel region search algorithm, dense region search (DRS), and its extensions

Keywords: Map search     Region search     Region recommendation     Spatial keyword search     Geographic information system    

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1,   Pages 88-103 doi: 10.1631/FITEE.2200118

Abstract: corresponding participant, the participant can authenticate the received shadow image with his/her private keyIn the decoding phase, the dealer can authenticate each received shadow image with a secret key; in addition

Keywords: Image secret sharing     Shadow image authentication     Public key     Pixel expansion     Lossless decoding    

Certificateless broadcast multi-signature for network coding Research Article

Huifang YU, Zhewei QI

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1369-1377 doi: 10.1631/FITEE.2200271

Abstract: To solve these problems, the certificateless broadcast multi-signature for (NC-CLBMS) method is devised

Keywords: Network coding     Certificateless multi-signature     Linear combination     Homomorphic hash function    

Low-computation certificateless hybrid signcryption scheme Article

Hui-fang YU, Bo YANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7,   Pages 928-940 doi: 10.1631/FITEE.1601054

Abstract: Hybrid signcryption is an important technique signcrypting bulk data using symmetric encryption.In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and construct a low-computation certificateless hybrid signcryption scheme.

Keywords: Hybrid signcryption     Scalar multiplication     Certificateless cryptosystem     Provable security    

Organizational dynamics in adaptive distributed search processes: effects on performance and the role

Friederike WALL

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 4,   Pages 283-295 doi: 10.1631/FITEE.1500306

Abstract: In this paper, the effects of altering the organizational setting of distributed adaptive search processesin the course of search are investigated.We put particular emphasis on the complexity of interactions between partial search problems assignedto search agents.achieved during the search process.

Keywords: Agent-based simulation     Complexity     Coordination     Distributed search     NK landscapes    

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Strategic Study of CAE 2004, Volume 6, Issue 10,   Pages 32-38

Abstract:

As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.

Keywords: WLAN     encryption     WEP     rekey    

Compressive strength prediction and optimization design of sustainable concrete based on squirrel search

Frontiers of Structural and Civil Engineering   Pages 1310-1325 doi: 10.1007/s11709-023-0997-3

Abstract: The results indicated that the squirrel search algorithm-extreme gradient boosting (SSA-XGB) yielded

Keywords: sustainable concrete     fly ash     slay     extreme gradient boosting technique     squirrel search algorithm    

Qualitative analysis of direction of public hospital reforms in China

Dahai Zhao, Zhiruo Zhang

Frontiers of Medicine 2018, Volume 12, Issue 2,   Pages 218-223 doi: 10.1007/s11684-017-0534-7

Abstract:

Reforms in public hospitals are among the most important improvements in China’s health careHowever, the reforms that should be implemented in public hospitals are unclear.are provided for the government to reform public hospitals.However, solely increasing this subsidy cannot address the inappropriate incentives of public hospitalsThe most crucial step in setting the direction of reforms in public hospitals in China is transforming

Keywords: public hospital     government hospital     public funding     operation mechanism    

The Routine and Emergency Coordinated Management of Public Security

Ning Liu

Frontiers of Engineering Management 2015, Volume 2, Issue 4,   Pages 331-338 doi: 10.15302/J-FEM-2015063

Abstract: The paper presents a study based on the observation of public security programme situations.Nowadays, public security management is faced with challenges such as the increase in non-traditionalFor the new adapted requirements of public security management, this paper puts forward the concept ofat normal status and the emergency management at the abnormal status based on the whole process of publicIn addition, this paper proposes the basic strategy of achieving the coordinated management of public

Keywords: public security     routine management     emergency management     coordinated management    

Title Author Date Type Operation

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

Aleakage-resilient certificateless public key encryption scheme withCCA2security

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Journal Article

Erratum to: Efficient keyword search over graph-structured data based on minimal covered

Asieh Ghanbarpour, Abbas Niknafs, Hassan Naderi,naderi@iust.ac.ir

Journal Article

Efficient keyword search over graph-structured data based on minimal covered

Asieh GHANBARPOUR, Khashayar NIKNAFS, Hassan NADERI

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

Current research, key performances and future development of search and rescue robots

LIU Jinguo, WANG Yuechao, LI Bin, MA Shugen

Journal Article

Finding map regions with high density of query keywords

Zhi YU, Can WANG, Jia-jun BU, Xia HU, Zhe WANG, Jia-he JIN

Journal Article

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Journal Article

Certificateless broadcast multi-signature for network coding

Huifang YU, Zhewei QI

Journal Article

Low-computation certificateless hybrid signcryption scheme

Hui-fang YU, Bo YANG

Journal Article

Organizational dynamics in adaptive distributed search processes: effects on performance and the role

Friederike WALL

Journal Article

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Journal Article

Compressive strength prediction and optimization design of sustainable concrete based on squirrel search

Journal Article

Qualitative analysis of direction of public hospital reforms in China

Dahai Zhao, Zhiruo Zhang

Journal Article

The Routine and Emergency Coordinated Management of Public Security

Ning Liu

Journal Article