-
1
Preserving data privacy in social recommendation
Published 2015-12-01Subjects: Get full text
Article -
2
A Biometric Key Establishment Protocol for Body Area Networks
Published 2011-08-01Get full text
Article -
3
-
4
Efficient data possession–checking protocol with deduplication in cloud
Published 2017-08-01Get full text
Article -
5
-
6
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Get full text
Article -
7
A Clustering Protocol for Wireless Sensor Networks Based on Energy Potential Field
Published 2013-01-01Get full text
Article -
8
Dual-stack host discovery method based on SSDP and DNS-SD protocol
Published 2023-02-01Get full text
Article -
9
Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN
Published 2016-04-01Get full text
Article -
10
CPK-ECC based mutual authentication protocol for large-scale RFID system
Published 2017-08-01Get full text
Article -
11
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
Published 2016-03-01Get full text
Article -
12
QoS-based sensing scheduling protocol for wireless sensor networks
Published 2010-01-01Get full text
Article -
13
-
14
Research on scheduled WLAN MAC protocol with failure retries on RoF-DAS architecture
Published 2020-03-01Get full text
Article -
15
Blinding assessment in randomised sham-controlled trials of acupuncture:protocol for a systematic survey
Published 2025-01-01Get full text
Article -
16
Location Information-Based Routing Protocol for Energy Harvesting Cognitive Radio Wireless Sensor Network
Published 2025-01-01Get full text
Article -
17
Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
Published 2021-08-01Get full text
Article -
18
Architecture Design and Key Technologies Analysis of LEO Satellite Mega-Constellations
Published 2024-06-01Get full text
Article -
19
Provably secure rational delegation computation protocol
Published 2019-07-01“…A provably secure rational delegation computation scheme was proposed to solve the requirement of security issues in rational delegate computation.Firstly,game theory was introduced into delegation computation and according to rational participants behavior preferences analysis,a rational delegate computing game model was designed.Secondly,according to the equilibrium demand of game model and the security requirement of rational delegation computation,a rational security model was established.Thirdly,combining Yao's garbled circuit with its advantages of re-randomization,as well as full homomorphic encryption technology,the rational delegation computation protocol was constructed.And the combination of strategies in the protocol could reach the Nash equilibrium state.Finally,the security of the protocol and the privacy of the input and output were proved according to the rational security model,and the performance analysis shows the validity of the protocol.The proposed rational delegation computing protocol not only satisfies the traditional security,but also considers the behavioral preference of participants,which is more in line with the delegationcomputing mode under the big data environment.…”
Get full text
Article -
20