financial support from the Natural Sciences and Engineering Research Council of Canada (NSERC);le Fonds de recherche du Quebec: Nature et technologies (FRQNT);The Centre Québécois sur les Matériaux Fonctionnels (CQMF);FRQNT and the China Scholarship Council (CSC) for awarding scholarships。
Constructing an information storage or communication system, where countless pieces of information canbe hidden like a canvas and revealed on demand throughspecific stimuli or decoding rules, is significant. In the pr...
supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP)funded by the Korea Government (MIST),Development of Collection and Integrated Analysis Methods of Automotive Inter and Intra System Artifacts through Construction of Event-Based Experimental System,under RS-2022-II221022.
With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recor...
partially supported by China National Key Research and Development Projects under Grant Nos.2020YFA0712300 and 2018YFA0704705。
Fully homomorphic encryption(FHE)can be used for privacy-preserving aggregation of medical data.In this typical application,the security against passive attacks has been well studied by Li and Micciancio(2021).In this...
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method...
There is a need for increased security measures because of wide variety of android Internet of Thing(IoT)mobile devices that can communicate with each other via networks for controlling the management of enterprise.El...
Data security is a very important part of data transmission over insecure channels connected through high-speed networks. Due to COVID-19, the use of data transmission over insecure channels has increased in an expone...
supported by the National Key R&D Program of China(No.2022YFB3204300);the National Natural Science Foundation of China(No.52103246);Zhejiang Provincial Natural Science Foundation,China(No.LQ22E030015);Natural Science Foundation of Ningbo,China(No.20221JCGY010301).
Anti-counterfeiting labels with various fluorescent colors are of great importance in information encryption-decryption,but are still limited to static information display.Therefore,it is urgent to develop new materia...
supported by the National Natural Science Foundation of China(Grant No.61973037)and(Grant No.61871414);Postdoctoral Fundation of China(Grant No.2022M720419)。
The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article propose...
The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of t...
supported by National Key Research and Development Program of China(Grant No.2021YFB3101100);National Natural Science Foundation of China(Grant Nos.61902290,62072352);Key Research and Development Program of Shaanxi(Grant Nos.2020ZDLGY09-06,2019ZDLGY12-04);Guangxi Key Laboratory of Trusted Software(Grant No.kx202004)。
With the rapid deployment of storage services,secure and efficient user authorization and revocation data shared through the cloud have become a grand challenge hindering cloud data applications.When previous direct a...