Search scope:
排序: Display mode:
ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1, Pages 28-42 doi: 10.1631/FITEE.1400133
Keywords: Storage image security Cryptographic file system Filesystem in userspace (FUSE) Transparent encryption
Preparation of transparent BaSO
Le Fang, Qian Sun, Yong-Hong Duan, Jing Zhai, Dan Wang, Jie-Xin Wang
Frontiers of Chemical Science and Engineering 2021, Volume 15, Issue 4, Pages 902-912 doi: 10.1007/s11705-020-1985-y
Keywords: BaSO4 nanoparticles rotating packed bed transparent nanodispersions BaSO4-PVB films
Huayang LEI, Yajie ZHANG, Yao HU, Yingnan LIU
Frontiers of Structural and Civil Engineering 2021, Volume 15, Issue 1, Pages 147-166 doi: 10.1007/s11709-020-0704-6
Keywords: shield tunneling face stability transparent clay model test numerical simulation
Utilizing transparent and conductive SnO
Jing Gu, Hongtao Yu, Xie Quan, Shuo Chen, Junfeng Niu
Frontiers of Environmental Science & Engineering 2020, Volume 14, Issue 4, doi: 10.1007/s11783-020-1251-z
Keywords: Z-scheme photocatalyst Tin oxide Electron mediator Organic pollutant
From resource sharing to service sharing: opportunities and challenges of transparent computing
Zhang Yaoxue,Zhou Yuezhi
Strategic Study of CAE 2009, Volume 11, Issue 8, Pages 10-17
Keywords: pervasive computing resource sharing service sharing transparent computing
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Strategic Study of CAE 2004, Volume 6, Issue 10, Pages 32-38
As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.
Keywords: WLAN encryption WEP rekey
Transformation of Fibrous Membranes from Opaque to Transparent Under Mechanical Pressing Article
Chao Wang, Jing Zhao, Liu Liu, Peng Zhang, Xianfeng Wang, Jianyong Yu, Bin Ding
Engineering 2022, Volume 19, Issue 12, Pages 84-92 doi: 10.1016/j.eng.2021.02.018
There is a great demand for transparent films, membranes, or substrates in the fields of intelligentThus, the development of transparent electrospun fibrous membranes is of great value.This work reports a simple and effective way to develop flexible and porous transparent fibrous membranesMoreover, this study demonstrated that transparent and conductive membranes can be fabricated based on
Keywords: Transparent Electrospun fibrous membranes Porous structure Mechanical pressing Conductivity
Frontiers of Environmental Science & Engineering 2021, Volume 15, Issue 4, doi: 10.1007/s11783-020-1361-7
• Bacteria could easily and quickly attached onto TEP to form protobiofilms.
Keywords: Transparent exopolymer particles (TEPs) TEP-protobiofilm Bacteria attachment Biofouling of membrane
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers
Mukti PADHYA, Devesh C. JINWALA
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1717-1748 doi: 10.1631/FITEE.1800192
Keywords: Searchable encryption Cloud storage Key-aggregate encryption Data sharing
Solid-state-reaction fabrication and properties of a high-doping Nd:YAG transparent laser ceramic
WU Yusong, LI Jiang, PAN Yubai, LIU Wenbin, AN Liqiong, WANG Shiwei, GUO Jingkun
Frontiers of Chemical Science and Engineering 2008, Volume 2, Issue 3, Pages 248-252 doi: 10.1007/s11705-008-0048-6
Keywords: neodymium-doped yttrium maximum absorbed microstructure fluorescence lifetime threshold
Constructing pairing-free certificateless public key encryption with keyword search Research Articles
Yang LU, Ji-guo LI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8, Pages 1049-1060 doi: 10.1631/FITEE.1700534
Keywords: Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
Gang Tang, Ruiqing Zhao, Dan Deng, Yadong Yang, Depeng Chen, Bing Zhang, Xinliang Liu, Xiuyu Liu
Frontiers of Chemical Science and Engineering 2021, Volume 15, Issue 5, Pages 1269-1280 doi: 10.1007/s11705-021-2042-1
Keywords: epoxy resin flame retardant furan derivative diphenylphosphine oxide
BORON: an ultra-lightweight and low power encryption design for pervasive computing Article
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3, Pages 317-331 doi: 10.1631/FITEE.1500415
Keywords: Lightweight cryptography SP network Block cipher Internet of Things (IoT) Encryption Embedded security
A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article
Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng
Engineering 2021, Volume 7, Issue 6, Pages 787-797 doi: 10.1016/j.eng.2021.03.011
Keywords: Information security Cloud-based design and manufacture Co-design CAD assembly models Attribute-based encryption
Title Author Date Type Operation
ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN
Journal Article
Preparation of transparent BaSO
Le Fang, Qian Sun, Yong-Hong Duan, Jing Zhai, Dan Wang, Jie-Xin Wang
Journal Article
Model test and discrete element method simulation of shield tunneling face stability in transparent clay
Huayang LEI, Yajie ZHANG, Yao HU, Yingnan LIU
Journal Article
Utilizing transparent and conductive SnO
Jing Gu, Hongtao Yu, Xie Quan, Shuo Chen, Junfeng Niu
Journal Article
From resource sharing to service sharing: opportunities and challenges of transparent computing
Zhang Yaoxue,Zhou Yuezhi
Journal Article
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Journal Article
Transformation of Fibrous Membranes from Opaque to Transparent Under Mechanical Pressing
Chao Wang, Jing Zhao, Liu Liu, Peng Zhang, Xianfeng Wang, Jianyong Yu, Bin Ding
Journal Article
Transparent exopolymer particles (TEPs)-associated protobiofilm: A neglected contributor to biofouling
Journal Article
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data
Mukti PADHYA, Devesh C. JINWALA
Journal Article
Solid-state-reaction fabrication and properties of a high-doping Nd:YAG transparent laser ceramic
WU Yusong, LI Jiang, PAN Yubai, LIU Wenbin, AN Liqiong, WANG Shiwei, GUO Jingkun
Journal Article
Constructing pairing-free certificateless public key encryption with keyword search
Yang LU, Ji-guo LI
Journal Article
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article
Self-extinguishing and transparent epoxy resin modified by a phosphine oxide-containing bio-based derivative
Gang Tang, Ruiqing Zhao, Dan Deng, Yadong Yang, Depeng Chen, Bing Zhang, Xinliang Liu, Xiuyu Liu
Journal Article
BORON: an ultra-lightweight and low power encryption design for pervasive computing
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Journal Article