UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 138
1.
  • pRide: Privacy-Preserving R... pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service
    Luo, Yuchuan; Jia, Xiaohua; Fu, Shaojing ... IEEE transactions on information forensics and security, 07/2019, Volume: 14, Issue: 7
    Journal Article
    Peer reviewed

    An online ride-hailing (ORH) service, such as Uber and Didi Chuxing, can provide on-demand transportation service to users via mobile phones, which brings great convenience to people's daily lives. ...
Full text
2.
  • A Privacy-preserving Fuzzy ... A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data
    Fu, Shaojing; Zhang, Qi; Jia, Nan ... Journal on special topics in mobile networks and applications/Mobile networks and applications, 08/2021, Volume: 26, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Fuzzy keyword search is a necessary and important feature of information retrieval in modern cloud storage services since users with insufficient knowledge may input typos or keywords with ...
Full text
3.
  • Constructions of 2-resilien... Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix
    Du, Jiao; Chen, Ziyu; Fu, Shaojing ... Theoretical computer science, 06/2022, Volume: 919
    Journal Article
    Peer reviewed

    In this paper, the properties of symbol transformations of cyclic Hadamard matrices are studied. An infinite class of (n−1)-variable 2-resilient rotation symmetric Boolean functions are constructed, ...
Full text
4.
  • Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations
    Yunpeng Yu; Yuchuan Luo; Dongsheng Wang ... 2016 IEEE International Conference on Communications (ICC), 05/2016
    Conference Proceeding

    Solving large-scale systems of linear equations (L-SLE) is a common scientific and engineering computational task. But such problem involves enormous computing resources, which is burdensome for the ...
Full text
5.
  • Securing the cloud storage ... Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
    Huang, Kun; Xian, Ming; Fu, Shaojing ... IET communications, August 2014, Volume: 8, Issue: 12
    Journal Article
    Peer reviewed

    Cloud computing has been envisioned as the next generation architecture of the IT enterprise, but there exist many security problems. A significant problem encountered in the context of cloud storage ...
Full text
6.
  • The phantom of differential... The phantom of differential characteristics
    Liu, Yunwen; Zhang, Wenying; Sun, Bing ... Designs, codes, and cryptography, 11/2020, Volume: 88, Issue: 11
    Journal Article
    Peer reviewed

    For differential cryptanalysis under the single-key model, the key schedules hardly need to be exploited in constructing the characteristics, which is based on the hypothesis of stochastic ...
Full text
7.
  • DPMF: Decentralized Probabi... DPMF: Decentralized Probabilistic Matrix Factorization for Privacy-Preserving Recommendation
    Yang, Xu; Luo, Yuchuan; Fu, Shaojing ... Applied sciences, 11/2022, Volume: 12, Issue: 21
    Journal Article
    Peer reviewed
    Open access

    Collaborative filtering is a popular approach for building an efficient and scalable recommender system. However, it has not unleashed its full potential due to the following problems. (1) Serious ...
Full text
8.
Full text

PDF
9.
  • An Effective Encrypted Sche... An Effective Encrypted Scheme Over Outsourcing Data for Query on Cloud Platform
    Tang, Jianchao; Fu, Shaojing; Xu, Ming IEEE access, 2019, Volume: 7
    Journal Article
    Peer reviewed
    Open access

    With the proliferation of cloud platforms, users are inclined to outsource their encrypted data to cloud platforms. However, the existing encryption schemes only provide users with limited query ...
Full text

PDF
10.
  • PPDC: A Privacy-Preserving ... PPDC: A Privacy-Preserving Distinct Counting Scheme for Mobile Sensing
    Yang, Xiaochen; Xu, Ming; Fu, Shaojing ... Applied sciences, 09/2019, Volume: 9, Issue: 18
    Journal Article
    Peer reviewed
    Open access

    Mobile sensing mines group information through sensing and aggregating users’ data. Among major mobile sensing applications, the distinct counting problem aiming to find the number of distinct ...
Full text

PDF
1 2 3 4 5
hits: 138

Load filters