Search scope:
排序: Display mode:
Aleakage-resilient certificateless public key encryption scheme withCCA2security None
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4, Pages 481-493 doi: 10.1631/FITEE.1601849
Keywords: Certificateless public-key encryption Leakage-resilience Provable security CCA2 security Decisional Diffie-Hellman
Constructing pairing-free certificateless public key encryption with keyword search Research Articles
Yang LU, Ji-guo LI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8, Pages 1049-1060 doi: 10.1631/FITEE.1700534
Keywords: Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers
Mukti PADHYA, Devesh C. JINWALA
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1717-1748 doi: 10.1631/FITEE.1800192
Keywords: Searchable encryption Cloud storage Key-aggregate encryption Data sharing
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article
Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1, Pages 88-103 doi: 10.1631/FITEE.2200118
Keywords: Image secret sharing Shadow image authentication Public key Pixel expansion Lossless decoding
Certificateless broadcast multi-signature for network coding Research Article
Huifang YU, Zhewei QI
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1369-1377 doi: 10.1631/FITEE.2200271
Keywords: Network coding Certificateless multi-signature Linear combination Homomorphic hash function
Low-computation certificateless hybrid signcryption scheme Article
Hui-fang YU, Bo YANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7, Pages 928-940 doi: 10.1631/FITEE.1601054
Keywords: Hybrid signcryption Scalar multiplication Certificateless cryptosystem Provable security
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Strategic Study of CAE 2004, Volume 6, Issue 10, Pages 32-38
As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.
Keywords: WLAN encryption WEP rekey
Qualitative analysis of direction of public hospital reforms in China
Dahai Zhao, Zhiruo Zhang
Frontiers of Medicine 2018, Volume 12, Issue 2, Pages 218-223 doi: 10.1007/s11684-017-0534-7
Reforms in public hospitals are among the most important improvements in China’s health careHowever, the reforms that should be implemented in public hospitals are unclear.are provided for the government to reform public hospitals.However, solely increasing this subsidy cannot address the inappropriate incentives of public hospitalsThe most crucial step in setting the direction of reforms in public hospitals in China is transforming
Keywords: public hospital government hospital public funding operation mechanism
The Routine and Emergency Coordinated Management of Public Security
Ning Liu
Frontiers of Engineering Management 2015, Volume 2, Issue 4, Pages 331-338 doi: 10.15302/J-FEM-2015063
Keywords: public security routine management emergency management coordinated management
Connecting Information to Promote Public Health
Xue-mei Su,Jia Zhao
Frontiers of Engineering Management 2016, Volume 3, Issue 4, Pages 384-389 doi: 10.15302/J-FEM-2016054
Keywords: public health information system data exchange China
Changes in public trust in physicians: empirical evidence from China
Dahai Zhao, Zhiruo Zhang
Frontiers of Medicine 2019, Volume 13, Issue 4, Pages 504-510 doi: 10.1007/s11684-018-0666-4
Keywords: trust in physicians public trust physician-patient relationship health system performance
Tender evaluation through efficiency analysis for public construction contracts
Stefan NIEWERTH, Peter VOGT, Markus THEWES
Frontiers of Engineering Management 2022, Volume 9, Issue 1, Pages 148-158 doi: 10.1007/s42524-020-0119-z
Keywords: bid evaluation public procurement best value for money data envelopment analysis contractor selection
Urban design based on public safety-Discussion on safety-based urban design
Kaizhen CAI, Jianguo WANG
Frontiers of Structural and Civil Engineering 2009, Volume 3, Issue 2, Pages 219-227 doi: 10.1007/s11709-009-0023-4
Keywords: urban public safety urban design safety-based urban design
Robust public-private partnerships for joint railway and property development
Ka Fai NG, Hong K. LO, Yue HUAI
Frontiers of Engineering Management 2017, Volume 4, Issue 4, Pages 437-450 doi: 10.15302/J-FEM-2017068
Keywords: public-private partnership BFOOD housing and railway development
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
Title Author Date Type Operation
Aleakage-resilient certificateless public key encryption scheme withCCA2security
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Journal Article
Constructing pairing-free certificateless public key encryption with keyword search
Yang LU, Ji-guo LI
Journal Article
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data
Mukti PADHYA, Devesh C. JINWALA
Journal Article
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com
Journal Article
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Journal Article
Qualitative analysis of direction of public hospital reforms in China
Dahai Zhao, Zhiruo Zhang
Journal Article
Changes in public trust in physicians: empirical evidence from China
Dahai Zhao, Zhiruo Zhang
Journal Article
Tender evaluation through efficiency analysis for public construction contracts
Stefan NIEWERTH, Peter VOGT, Markus THEWES
Journal Article
Urban design based on public safety-Discussion on safety-based urban design
Kaizhen CAI, Jianguo WANG
Journal Article
Robust public-private partnerships for joint railway and property development
Ka Fai NG, Hong K. LO, Yue HUAI
Journal Article