supported by National Key Research and Development Plan of China(Grant No.2020YFB1005600);Major Program of Guangdong Basic and Applied Research Project(Grant No.2019B030302008);National Natural Science Foundation of China(Grant No.61825203);Guangdong Provincial Science and Technology Project(Grant Nos.2017B010111005,2021A0505030033);National Joint Engineering Research Center of Network Security Detection and Protection Technology;Guangdong Key Laboratory of Data Security and Privacy Preserving。
A public-key authenticated encryption with keyword search(PAEKS)[1,2]system overcomes the problem of an inside adversary forging searchable ciphertexts and guessing the keyword information from the given token.This sy...
This work was supported in part by the National Natural Science Foundation of China(Nos.62072074,62076054,62027827,62002047);the Sichuan Science and Technology Innovation Platform and Talent Plan(Nos.2020JDJQ0020,2022JDJQ0039);the Sichuan Science and Technology Support Plan(Nos.2020YFSY0010,2022YFQ0045,2022YFS0220,2023YFG0148,2021YFG0131);the YIBIN Science and Technology Support Plan(No.2021CG003);the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar...
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions.In addition,they have been deployed in civilian critical infrastructure monitoring.In this environm...
supported by the National Key Research and Development Program of China,“Joint Research of IoT Security System and Key Technologies Based on Quantum Key,”under project number 2020YFE0200600.
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ...
Nowadays,the widespread application of 5G has promoted rapid development in different areas,particularly in the Internet of Things(IoT),where 5G provides the advantages of higher data transfer rate,lower latency,and w...
This research is funded by UKM under Grant No.GUP-2020-029.
Communication technology has advanced dramatically amid the 21st century,increasing the security risk in safeguarding sensitive information.The remote password authentication(RPA)scheme is the simplest cryptosystem th...
We extend our gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through the research groups programunder grant number R.G.P.1/72/42;The work of Agbotiname Lucky Imoize is supported by the Nigerian Petroleum Technology Development Fund(PTDF)and the German Academic Exchange Service(DAAD)through the Nigerian-German Postgraduate Program under Grant 57473408.
The commercialization of the fifth-generation(5G)wireless network has begun.Massive devices are being integrated into 5G-enabled wireless sensor networks(5GWSNs)to deliver a variety of valuable services to network use...
This work was supported by the National Natural Science Foundation of China(No.61662004,61772437,61702427);National Natural Science Foundation of Guangxi(No.2016GXNSFAA380215);Sichuan Youth Science and Technique Foundation(No.2017JQ0048);EU ICT COST CryptoAction(No.IC1306).
The secure issues of APK are very important in Android applications.In order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mech...
supported by Strategic Priority Research Program of the Chinese Academy of Sciences(Grant Nos.XDA06010703,XDA06010701);National Natural Science Foundation of China(Grant Nos.61472416,61272478,61632020);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-14-002);CREST,Japan Science and Technolegy Agency
Secure cloud storage(SCS) guarantees the data outsourced to the cloud to remain intact as it was before being outsourced. Previous schemes to ensure cloud storage reliability are either computationally heavy or admi...
supported by the National Natural Science Foundation of China(No.61272481,No.61402434);China Post-doctoral Science Foundation Funded Project(No.2014M550085);the Open Fund of State Key Laboratory of Information Security(No.2014-12)
Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password.Most of these protocols are often li...