Resource Type

Journal Article 318

Year

2023 35

2022 23

2021 23

2020 25

2019 25

2018 16

2017 21

2016 21

2015 20

2014 13

2013 11

2012 8

2011 16

2010 10

2009 13

2008 3

2007 12

2006 2

2005 2

2004 3

open ︾

Keywords

key technology 12

public health 9

China 6

key technologies 5

COVID-19 4

Encryption 4

sustainability 4

2035 3

Attribute-based encryption 3

Cloud storage 3

emergency management 3

6G 2

Access control 2

Block cipher 2

Deep mining 2

Delphi method 2

Embedded security 2

construction time 2

development trend 2

open ︾

Search scope:

排序: Display mode:

Aleakage-resilient certificateless public key encryption scheme withCCA2security None

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 481-493 doi: 10.1631/FITEE.1601849

Abstract: attention has been focused on designing provably secure cryptographic primitives in the presence of keyperformance, a new construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificatelesspublic-key encryption scheme is proposed, whose security is proved based on the hardness of the classicAccording to our analysis, our method can tolerate leakage attacks on the private key.from the corresponding ciphertext, and a key leakage ratio of 1/2 can be achieved.

Keywords: Certificateless public-key encryption     Leakage-resilience     Provable security     CCA2 security     Decisional Diffie-Hellman    

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Searchable public key encryption enables a storage server to retrieve the publicly encrypted data withoutCertificateless cryptography (CLC) is a novel cryptographic primitive that has many merits.It overcomes the key escrow problem in identity-based cryptosystems and the cumbersome certificate problemin conventional public key cryptosystems.Motivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing    

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypteddata with support for data owners to share an aggregate searchable key with a user delegating searchIn MULKASE, the size of the aggregate key is independent of the number of documents held by a data ownerThe size of an aggregate key remains constant even though the number of outsourced ciphertexts goes beyond

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1,   Pages 88-103 doi: 10.1631/FITEE.2200118

Abstract: corresponding participant, the participant can authenticate the received shadow image with his/her private keyIn the decoding phase, the dealer can authenticate each received shadow image with a secret key; in addition

Keywords: Image secret sharing     Shadow image authentication     Public key     Pixel expansion     Lossless decoding    

Certificateless broadcast multi-signature for network coding Research Article

Huifang YU, Zhewei QI

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1369-1377 doi: 10.1631/FITEE.2200271

Abstract: To solve these problems, the certificateless broadcast multi-signature for (NC-CLBMS) method is devised

Keywords: Network coding     Certificateless multi-signature     Linear combination     Homomorphic hash function    

Low-computation certificateless hybrid signcryption scheme Article

Hui-fang YU, Bo YANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7,   Pages 928-940 doi: 10.1631/FITEE.1601054

Abstract: Hybrid signcryption is an important technique signcrypting bulk data using symmetric encryption.In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and construct a low-computation certificateless hybrid signcryption scheme.

Keywords: Hybrid signcryption     Scalar multiplication     Certificateless cryptosystem     Provable security    

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Strategic Study of CAE 2004, Volume 6, Issue 10,   Pages 32-38

Abstract:

As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.

Keywords: WLAN     encryption     WEP     rekey    

Qualitative analysis of direction of public hospital reforms in China

Dahai Zhao, Zhiruo Zhang

Frontiers of Medicine 2018, Volume 12, Issue 2,   Pages 218-223 doi: 10.1007/s11684-017-0534-7

Abstract:

Reforms in public hospitals are among the most important improvements in China’s health careHowever, the reforms that should be implemented in public hospitals are unclear.are provided for the government to reform public hospitals.However, solely increasing this subsidy cannot address the inappropriate incentives of public hospitalsThe most crucial step in setting the direction of reforms in public hospitals in China is transforming

Keywords: public hospital     government hospital     public funding     operation mechanism    

The Routine and Emergency Coordinated Management of Public Security

Ning Liu

Frontiers of Engineering Management 2015, Volume 2, Issue 4,   Pages 331-338 doi: 10.15302/J-FEM-2015063

Abstract: The paper presents a study based on the observation of public security programme situations.Nowadays, public security management is faced with challenges such as the increase in non-traditionalFor the new adapted requirements of public security management, this paper puts forward the concept ofat normal status and the emergency management at the abnormal status based on the whole process of publicIn addition, this paper proposes the basic strategy of achieving the coordinated management of public

Keywords: public security     routine management     emergency management     coordinated management    

Connecting Information to Promote Public Health

Xue-mei Su,Jia Zhao

Frontiers of Engineering Management 2016, Volume 3, Issue 4,   Pages 384-389 doi: 10.15302/J-FEM-2016054

Abstract: These information systems are described as public health information systems (PHIS) in China.China, there should be a connection and data sharing mechanism between EMR (EHR) and PHIS to support publichealth surveillance and public health decision-making.

Keywords: public health     information system     data exchange     China    

Changes in public trust in physicians: empirical evidence from China

Dahai Zhao, Zhiruo Zhang

Frontiers of Medicine 2019, Volume 13, Issue 4,   Pages 504-510 doi: 10.1007/s11684-018-0666-4

Abstract: Studies examining the trends in public trust in physicians have provided a considerable amount of valuableThis study investigated changes in public trust in physicians in China based on two cross-sectional nationalThe results of ordinal logistic regression demonstrated that public trust in physicians in China hadThe results also confirmed that decreasing public satisfaction with the most recent treatment experiencewas the major determinant of decreasing public trust in physicians in China.

Keywords: trust in physicians     public trust     physician-patient relationship     health system performance    

Tender evaluation through efficiency analysis for public construction contracts

Stefan NIEWERTH, Peter VOGT, Markus THEWES

Frontiers of Engineering Management 2022, Volume 9, Issue 1,   Pages 148-158 doi: 10.1007/s42524-020-0119-z

Abstract: Given the European Public Procurement Directive 2014/24/EU, policymakers have ordered the inclusion ofas the price, life-cycle costs, environmental, and social aspects, in the evaluation of tenders for publicFor public procurement, the proposed method combines two advantages.Second, the proposed method supports the intention of policy makers to promote public goals, such asimprovement of certain criteria values in future tenders and consequently leads to an enhancement of public

Keywords: bid evaluation     public procurement     best value for money     data envelopment analysis     contractor selection    

Urban design based on public safety-Discussion on safety-based urban design

Kaizhen CAI, Jianguo WANG

Frontiers of Structural and Civil Engineering 2009, Volume 3, Issue 2,   Pages 219-227 doi: 10.1007/s11709-009-0023-4

Abstract: Because of public safety problems in construction of urban surroundings, this paper expounds the necessityof the study on public safety-based urban design in perspective of modern city.

Keywords: urban public safety     urban design     safety-based urban design    

Robust public-private partnerships for joint railway and property development

Ka Fai NG, Hong K. LO, Yue HUAI

Frontiers of Engineering Management 2017, Volume 4, Issue 4,   Pages 437-450 doi: 10.15302/J-FEM-2017068

Abstract: infrastructure project may enhance the financial viability of projects, which facilitates the formation of public-privatePPP exploits the strength of the private sector by shifting certain project risks from the public partymodels by distributing railway and housing revenues and costs and their inherent risks properly to the public

Keywords: public-private partnership     BFOOD     housing and railway development    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: (HIBE) scheme in the standard model whose public key size is only ( ) log bits and whose message-ciphertextIn our construction, a novel public key assignment rule is used to averagely assign one random and publicin the scheme proposed at Crypto 2010 whose public key size is (2 ) log .into m log q bits of ciphertext by a one time encryption operation.Hence, the presented scheme has some advantages with respect to not only the public key size but also

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

Title Author Date Type Operation

Aleakage-resilient certificateless public key encryption scheme withCCA2security

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Journal Article

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing

Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com

Journal Article

Certificateless broadcast multi-signature for network coding

Huifang YU, Zhewei QI

Journal Article

Low-computation certificateless hybrid signcryption scheme

Hui-fang YU, Bo YANG

Journal Article

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Journal Article

Qualitative analysis of direction of public hospital reforms in China

Dahai Zhao, Zhiruo Zhang

Journal Article

The Routine and Emergency Coordinated Management of Public Security

Ning Liu

Journal Article

Connecting Information to Promote Public Health

Xue-mei Su,Jia Zhao

Journal Article

Changes in public trust in physicians: empirical evidence from China

Dahai Zhao, Zhiruo Zhang

Journal Article

Tender evaluation through efficiency analysis for public construction contracts

Stefan NIEWERTH, Peter VOGT, Markus THEWES

Journal Article

Urban design based on public safety-Discussion on safety-based urban design

Kaizhen CAI, Jianguo WANG

Journal Article

Robust public-private partnerships for joint railway and property development

Ka Fai NG, Hong K. LO, Yue HUAI

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article