DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 45
1.
  • Receiver selective opening ... Receiver selective opening security for identity-based encryption in the multi-challenge setting
    Huang, Zhengan; Lai, Junzuo; Zeng, Gongxian ... Designs, codes, and cryptography, 04/2023, Letnik: 91, Številka: 4
    Journal Article
    Recenzirano

    Receiver selective opening (RSO) security requires that in a situation where there are one sender and multiple receivers, even if an adversary has access to all ciphertexts and adaptively corrupts ...
Celotno besedilo
Dostopno za: UL
2.
  • Strongly nonoutsourceable s... Strongly nonoutsourceable scratch-off puzzles in blockchain
    Zeng, Gongxian; Huang, Zhengan; Wang, Yu ... Soft computing (Berlin, Germany), 09/2023, Letnik: 27, Številka: 17
    Journal Article
    Recenzirano

    Blockchain and its most selling point decentralization have attracted lots of attentions. However, the problem of centralized mining pools (also called outsourcing problem) is a serious threat to the ...
Celotno besedilo
Dostopno za: UL
3.
Celotno besedilo
Dostopno za: UL
4.
  • A Self-Tallying Electronic ... A Self-Tallying Electronic Voting Based on Blockchain
    Zeng, Gongxian; He, Meiqi; Yiu, Siu Ming ... Computer journal, 12/2022, Letnik: 65, Številka: 12
    Journal Article
    Recenzirano

    Abstract Electronic voting (e-voting) has been studied for many years. Recently, researchers find that blockchain can provide an alternative secure platform for e-voting systems, because of its ...
Celotno besedilo
Dostopno za: UL
5.
  • Self–Tallying Electronic Vo... Self–Tallying Electronic Voting Based on Blockchain
    Zeng, Gongxian; He, Meiqi; Yiu, Siu Ming ... ITNOW, 02/2023, Letnik: 65, Številka: 1
    Journal Article
    Odprti dostop

    Abstract Paper–based voting systems are not only environmentally unfriendly but also require a lot of manpower for tallying. Gongxian Zeng, Meiqi He, Siu Ming Yiu, Zhengan Huang propose an ...
Celotno besedilo
Dostopno za: UL
6.
  • Privacy-preserving verifiab... Privacy-preserving verifiable elastic net among multiple institutions in the cloud
    Zhang, Jun; He, Meiqi; Zeng, Gongxian ... Journal of computer security, 01/2018, Letnik: 26, Številka: 6
    Journal Article
    Recenzirano

    With the popularity of cloud computing, an increasing number of institutions outsource their data to a third-party cloud system which could be untrusted. The institutions encrypt their data before ...
Celotno besedilo
Dostopno za: UL
7.
  • Anonymous Counting Problem ... Anonymous Counting Problem in Trust Level Warning System for VANET
    Yeung, Cheuk Yu; Hui, Lucas Chi Kwong; Chim, Tat Wing ... IEEE transactions on vehicular technology, 2019-Jan., 2019-1-00, 20190101, Letnik: 68, Številka: 1
    Journal Article
    Recenzirano

    Using vehicular ad-hoc network, smart vehicles can detect dangerous events on the road and announce warnings to other vehicles to ensure road safety. The other vehicles nearby may receive the warning ...
Celotno besedilo
Dostopno za: UL
8.
  • A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database
    He, Meiqi; Zhang, Jun; Zeng, Gongxian ... 2017 15th Annual Conference on Privacy, Security and Trust (PST)
    Conference Proceeding

    Searching encrypted database is an important topic as more users want to leverage a third-party cloud system to store and process their data in encrypted form. Despite a lot of wonderful results, ...
Celotno besedilo
Dostopno za: UL
9.
  • A Nonoutsourceable Puzzle Under GHOST Rule
    Zeng, Gongxian; Yiu, Siu Ming; Zhang, Jun ... 2017 15th Annual Conference on Privacy, Security and Trust (PST)
    Conference Proceeding

    Blockchain technology has attracted a lot of attention in recent years. Applications of blockchain are not only restricted to cybercurrencies, but have also been extended to other areas such as ...
Celotno besedilo
Dostopno za: UL
10.
  • Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform
    Zeng, Gongxian; He, Meiqi; Zhang, Linru ... 2018 16th Annual Conference on Privacy, Security and Trust (PST), 2018-Aug.
    Conference Proceeding

    Searchable compressed data structures (e.g.Burrows-Wheeler Transform) enable one to create a memoryefficient index for large datasets such as human genomes. On the other hand, storing such an index ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 45

Nalaganje filtrov