Search scope:
排序: Display mode:
Constructing pairing-free certificateless public key encryption with keyword search Research Articles
Yang LU, Ji-guo LI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8, Pages 1049-1060 doi: 10.1631/FITEE.1700534
Keywords: Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing
Aleakage-resilient certificateless public key encryption scheme withCCA2security None
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4, Pages 481-493 doi: 10.1631/FITEE.1601849
Keywords: Certificateless public-key encryption Leakage-resilience Provable security CCA2 security Decisional Diffie-Hellman
Erratum to: Efficient keyword search over graph-structured data based on minimal covered Erratum
Asieh Ghanbarpour, Abbas Niknafs, Hassan Naderi,naderi@iust.ac.ir
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.18e0133
Efficient keyword search over graph-structured data based on minimal covered Article
Asieh GHANBARPOUR, Khashayar NIKNAFS, Hassan NADERI
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 3, Pages 448-464 doi: 10.1631/FITEE.1800133
Keywords: Keyword search Graph mining Information retrieval Database Clique
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers
Mukti PADHYA, Devesh C. JINWALA
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1717-1748 doi: 10.1631/FITEE.1800192
Keywords: Searchable encryption Cloud storage Key-aggregate encryption Data sharing
Current research, key performances and future development of search and rescue robots
LIU Jinguo, WANG Yuechao, LI Bin, MA Shugen
Frontiers of Mechanical Engineering 2007, Volume 2, Issue 4, Pages 404-416 doi: 10.1007/s11465-007-0070-2
Keywords: national development communicability mobility national intelligent network
Finding map regions with high density of query keywords Article
Zhi YU, Can WANG, Jia-jun BU, Xia HU, Zhe WANG, Jia-he JIN
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10, Pages 1543-1555 doi: 10.1631/FITEE.1600043
Keywords: Map search Region search Region recommendation Spatial keyword search Geographic information system
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article
Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1, Pages 88-103 doi: 10.1631/FITEE.2200118
Keywords: Image secret sharing Shadow image authentication Public key Pixel expansion Lossless decoding
Certificateless broadcast multi-signature for network coding Research Article
Huifang YU, Zhewei QI
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1369-1377 doi: 10.1631/FITEE.2200271
Keywords: Network coding Certificateless multi-signature Linear combination Homomorphic hash function
Low-computation certificateless hybrid signcryption scheme Article
Hui-fang YU, Bo YANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7, Pages 928-940 doi: 10.1631/FITEE.1601054
Keywords: Hybrid signcryption Scalar multiplication Certificateless cryptosystem Provable security
Friederike WALL
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 4, Pages 283-295 doi: 10.1631/FITEE.1500306
Keywords: Agent-based simulation Complexity Coordination Distributed search NK landscapes
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Strategic Study of CAE 2004, Volume 6, Issue 10, Pages 32-38
As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.
Keywords: WLAN encryption WEP rekey
Frontiers of Structural and Civil Engineering Pages 1310-1325 doi: 10.1007/s11709-023-0997-3
Keywords: sustainable concrete fly ash slay extreme gradient boosting technique squirrel search algorithm
Qualitative analysis of direction of public hospital reforms in China
Dahai Zhao, Zhiruo Zhang
Frontiers of Medicine 2018, Volume 12, Issue 2, Pages 218-223 doi: 10.1007/s11684-017-0534-7
Reforms in public hospitals are among the most important improvements in China’s health careHowever, the reforms that should be implemented in public hospitals are unclear.are provided for the government to reform public hospitals.However, solely increasing this subsidy cannot address the inappropriate incentives of public hospitalsThe most crucial step in setting the direction of reforms in public hospitals in China is transforming
Keywords: public hospital government hospital public funding operation mechanism
The Routine and Emergency Coordinated Management of Public Security
Ning Liu
Frontiers of Engineering Management 2015, Volume 2, Issue 4, Pages 331-338 doi: 10.15302/J-FEM-2015063
Keywords: public security routine management emergency management coordinated management
Title Author Date Type Operation
Constructing pairing-free certificateless public key encryption with keyword search
Yang LU, Ji-guo LI
Journal Article
Aleakage-resilient certificateless public key encryption scheme withCCA2security
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Journal Article
Erratum to: Efficient keyword search over graph-structured data based on minimal covered
Asieh Ghanbarpour, Abbas Niknafs, Hassan Naderi,naderi@iust.ac.ir
Journal Article
Efficient keyword search over graph-structured data based on minimal covered
Asieh GHANBARPOUR, Khashayar NIKNAFS, Hassan NADERI
Journal Article
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data
Mukti PADHYA, Devesh C. JINWALA
Journal Article
Current research, key performances and future development of search and rescue robots
LIU Jinguo, WANG Yuechao, LI Bin, MA Shugen
Journal Article
Finding map regions with high density of query keywords
Zhi YU, Can WANG, Jia-jun BU, Xia HU, Zhe WANG, Jia-he JIN
Journal Article
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com
Journal Article
Organizational dynamics in adaptive distributed search processes: effects on performance and the role
Friederike WALL
Journal Article
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Journal Article
Compressive strength prediction and optimization design of sustainable concrete based on squirrel search
Journal Article
Qualitative analysis of direction of public hospital reforms in China
Dahai Zhao, Zhiruo Zhang
Journal Article