The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In smart grid, large quantities of data is collected from various applications, such as smart metering substation state monitoring, electric energy data acquisition, and smart home. Big data acquired in smart grid applications is usually sensitive. For instance, in order to dispatch accurately and support the dynamic price, lots of smart meters are installed at user's house to collect the real-time...
Personal Genomic information is becoming increasingly important to both scientific research and clinical practice. However, security breach, misuse, or unintended disclosure of this information may result in severe privacy breaches. Traditional privacy preservation of personal genome information is implemented in an “all-or-none” manner, i.e., an entire genome being controlled as either fully accessible...
Combination of mobile Agent, Aglet platform and the Java language, this paper presents a security framework of e-commerce based on mobile agents and its implementation. In electronic shopping process, for example, the security issues of a mobile agent encountered in the system was detailed analysis when it migrated, registration, licensing and information exchange, and so on. The security framework...
This paper presents the first multi-use unidirectional proxy re-encryption scheme proven-secure against chosenciphertext attacks and collusion attacks in the standard model. Although our proposal features a linear ciphertext size and decryption time in the number of translations, we emphasize that it is the first multi-use and unidirectional realization of the primitive satisfying the chosen-ciphertext...
In this paper, we present a distributed incremental data aggregation approach, in which data aggregation is performed at all smart meters involved in routing the data from the source meter to the collector unit. With a carefully constructed aggregation tree, the aggregation route covers the entire local neighborhood or any arbitrary set of designated nodes with minimum overhead. To protect user privacy,...
Proxy re-encryption is a useful cryptographic primitive, which allows a proxy to transform a ciphertext for Alice to another ciphertext of the same plaintext for Bob. Type-based proxy re-encryption is a specific kind of proxy re-encryption, where the proxy is restricted to transform only a subset of Alice's ciphertexts. This restriction is very useful in the situation where the fine-grained transformation...
This letter presents a new image encryption scheme, which employs the two-dimensional discrete hyper-chaotic mapping to shuffle the positions of image pixels and then uses hyper-chaos of Er-doped fiber laser to confuse the relationship between the plain-image and the cipher-image. For decreasing the total encryption time, a certain "add-and-shift" operation for diffusion is introduced in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.