The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the pervasiveness of location-aware mobile electronic devices and the advances of wireless communications, location-based services (LBS), which can help people enjoy a convenient life, has attracted considerable interest recently. However, the privacy issues of LBS are still challenging today. Aiming at the challenges, in this paper, we present a new efficient and privacy-preserving LBS query...
In order to avoid data loss when user's mobile device is stolen or lost, users are encouraged to use mobile cloud storage to transfer and store the data from mobile terminals to the cloud as a means of data backup. Although various encryption mechanisms have been proposed to protect the security in cloud side by cloud service providers, the traditional cloud systems still cannot persuade the users...
In this paper, we have proposed a novel encryption scheme with chaotic process based on Enigma. The encryption scheme takes the advantage of the approximate non-linear mechanism of original Enigma, with the chaos controlling the encryption process. It has strengthened the randomness of plaintext replacement and improved the security of the encryption scheme. The results of encrypting images and letters...
Signature, encryption and key exchange are some of the most important and foundational cryptographical tool. In most cases, they are all needed to provide different secure functions. There exist called authenticated encryption scheme and signcryption schemes that is the integration of signature and encryption. On the other hand, there are also some proposals on the efficient combination of signature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.