Showing 1 - 20 results of 25 for search 'NETWORK SECURITY', query time: 0.71s Refine Results
  1. 1
  2. 2
    by Lijing Zhou, Licheng Wang, Yiru Sun, Tianyi Ai
    Published 2018-01-01
    Subjects: ...Secure multi-party computation...
    Get full text
    Article
  3. 3
  4. 4
  5. 5
    ... improves the security of the image in the transmission process. Next, we process the image in the cloud...
    Get full text
    Article
  6. 6
    by Yuan Liu, Licheng Wang, Lixiang Li, Xixi Yan
    Published 2019-01-01
    ... proposed a security and efficient multi-authority ABE scheme from lattices in this paper. The scheme...
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
    ... instigated a momentous research interest in the field of Vehicular Ad Hoc Network (VANET) security...
    Get full text
    Article
  15. 15
    by Pin Lv, Licheng Wang, Huijun Zhu, Wenbo Deng, Lize Gu
    Published 2019-01-01
    ... the network, thereby sharing all nodes data. This process can be implemented by using a publish/subscribe (pub...
    Get full text
    Article
  16. 16
    ... signcryption schemes were proposed recently. But both of them were merely proved to be secure in the random...
    Get full text
    Article
  17. 17
    by Haibo Hong, Jing Li, Licheng Wang, Yixian Yang, Xinxin Niu
    Published 2014-01-01
    ... with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis...
    Get full text
    Article
  18. 18
    by Yunhong Zhou, Shihui Zheng, Licheng Wang
    Published 2020-10-01
    ... critically important and promising technique which provides secure search over encrypted data in cloud...
    Get full text
    Article
  19. 19
    by Hong Zhao, Xue Bai, Shihui Zheng, Licheng Wang
    Published 2020-06-01
    ... development of blockchain applications, the privacy and security issues of Ethereum have gradually emerged...
    Get full text
    Article
  20. 20
    by Huijun Zhu, Licheng Wang, Haseeb Ahmad, Dong Xie
    Published 2021-01-01
    ... to present improved security schemes. With this aim, an efficient public key encryption scheme with equality...
    Get full text
    Article