PRIVACY-PRESERVING

作品数:232被引量:344H指数:9
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:杨萍杨明马朝虹更多>>
相关机构:电子科技大学复旦大学燕山大学上海交通大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金中国博士后科学基金国家教育部博士点基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=High-Confidence Computingx
条 记 录,以下是1-7
视图:
排序:
EPri-MDAS:An efficient privacy-preserving multiple data aggregation scheme without trusted authority for fog-based smart grid
《High-Confidence Computing》2024年第4期69-81,共13页Jinjiao Zhang Wenying Zhang Xiaochao Wei Huimin Liu 
supported by the National Natural Science Foundation of China(62272282).
With the increasingly pervasive deployment of fog servers,fog computing extends data processing and analysis to network edges.At the same time,as the next-generation power grid,the smart grid should meet the requireme...
关键词:PRIVACY-PRESERVING Multiple data aggregation Smart grid Fog computing 
Identity-based threshold(multi)signature with private accountability for privacy-preserving blockchain
《High-Confidence Computing》2024年第4期105-115,共11页Jing Tian Yanqi Zhao Xiaoyi Yang Xuan Zhao Ruonan Chen Yong Yu 
supported by the National Key R&D Program of China(2022YFB2701500);the National Natural Science Foun-dation of China(62272385,62202375);Shaanxi Distinguished Youth Project,China(2022JC-47);the Major Program of Shandong Provincial Natural Science Foundation for the Fundamental Re-search,China under Grant(ZR2022ZD03);the Key Research and Development Program of Shaanxi,China(2024GX-ZDCYL-01-09,2024GX-ZDCYL-01-15);Young Talent Fund of Association for Science and Technology in Shaanxi,China(20220134).
Identity-based threshold signature(IDTHS)allows a threshold number of signers to generate signatures to improve the deterministic wallet in the blockchain.However,the IDTHS scheme cannot determine the identity of mali...
关键词:Identity-based signature Threshold(multi)signature ACCOUNTABILITY Blockchain 
Privacy-preserving human activity sensing:A survey
《High-Confidence Computing》2024年第1期108-117,共10页Yanni Yang Pengfei Hu Jiaxing Shen Haiming Cheng Zhenlin An Xiulong Liu 
supported by the National Key Research and Development Program of China(2021YFB3100400);National Natural Science Foundation of China(62302274,62202276 and 62232010);Shandong Science Fund for Excellent Young Scholars,China(2022HWYQ-038);Natural Science Foundation of Shandong,China(ZR2023QF113);financial support of Lingnan University(LU),China(DB23A4);Lam Woo Research Fund at LU,China(871236)。
With the prevalence of various sensors and smart devices in people’s daily lives,numerous types of information are being sensed.While using such information provides critical and convenient services,we are gradually ...
关键词:Human activity sensing Privacy-preserving sensing Activity sensing algorithms Human sensors Privacy protection 
SoK:Privacy-preserving smart contract
《High-Confidence Computing》2024年第1期81-91,共11页Huayi Qi Minghui Xu Dongxiao Yu Xiuzhen Cheng 
supported by the National Key R&D Program of China(2022YFB4501000);the National Natural Science Foundation of China(62232010 and 62302266);Shandong Science Fund for Excellent Young Scholars,China(2023HWYQ-008);Shandong Science Fund for Key Fundamental Research Project,China(ZR2022ZD02);the Fundamental Research Funds for the Central Universities,China.
The privacy concern in smart contract applications continues to grow,leading to the proposal of various schemes aimed at developing comprehensive and universally applicable privacy-preserving smart contract(PPSC)schem...
关键词:PRIVACY Smart contract Zero-knowledge proof Trusted execution environment Blockchain 
Privacy-preserving federated learning for transportation mode prediction based on personal mobility data
《High-Confidence Computing》2022年第4期23-27,共5页Fuxun Yu Zirui Xu Zhuwei Qin Xiang Chen 
Personal daily mobility trajectories/traces like Google Location Service integrates many valuable information from individuals and could benefit a lot of application scenarios,such as pandemic control and precaution,p...
关键词:Federated learning PRIVACY Deep learning 
Towards privacy-preserving dynamic deep packet inspection over outsourced被引量:2
《High-Confidence Computing》2022年第1期1-8,共8页Chunxiao Li Yu Guo Xia Wang 
supported by the Fundamental Research Funds for the Central Universities under grants 310421108.
The prosperity of network function virtualization(NFV)pushes forward the paradigm of migrating in-house middleboxes to third-party providers,i.e.,software(virtualized)middlebox services.A lot of enterprises have outso...
关键词:DPI outsourcing Network function virtualization Dynamic searchable symmetric encryption 
A cloud-based framework for verifiable privacy-preserving spectrum auction
《High-Confidence Computing》2022年第1期47-53,共7页Ruinian Li Tianyi Song Bo Mei Chunqiang Hu Wei Li Maya Larson Xiuzhen Cheng Rongfang Bie 
partially supported by the National Natural Science Foundation of the China under grant 61,571,049 and 62072065;the Fundamental Research Funds for the Central Universities(2021CD-JKYJH031);the Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing under grant cx20200004.
Spectrum auction is one of the most effective ways to achieve dynamic spectrum allocation in cognitive radio net-works,and it provides one effective way to manage the spectrum demands of IoT devices with limited resou...
关键词:Homomorphic encryption Re-encryption Spectrum auction Privacy-preservation auction 
检索报告 对象比较 聚类工具 使用帮助 返回顶部