The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The increasing market share of electric vehicles (EVs) makes charging facilities indispensable infrastructure for integrating EVs into the future intelligent transportation systems and smart grid. One promising facility called fast charging reservation(FCR) system was recently proposed. It allows people to reserve fast chargers ahead of time. In this system, fast chargers are the most scarce resource...
The emerging participatory sensing applications rely on individuals' inputs which may be highly correlated with individuals' sensitive information or personal data. Hence, privacy protection is crucial to encourage individual participation for participatory sensing applications to generate trustworthy and high quality data. A widely used technique for privacy preservation is data perturbation, which...
Traffic analysis has been exploited by attackers to threaten user privacy in wireless networks. As an example, a user's on line activities may be exposed to strangers, even if the traffic is encrypted. However, the existing defense mechanisms against traffic analysis, such as packet padding and traffic morphing, are inefficient because they add noise traffic to blur the traffic features, therefore...
Anonymous technology is an important identity protection technology, it can realize the privacy-preserving of the user. As two important cryptographic technologies, blind signature and ring signature can realize anonymity, thus, they play very important roles in realizing the anonymity of user's information. To fit with the requirement in real life, we propose a blind ring signature scheme by combining...
Data fusion or information collection is one of the fundamental functions in the future cyber-physical systems. But, privacy concerns must be addressed and security must be assured in such systems. It is very challenging to achieve the synergy of privacy and integrity, because privacy preserving schemes try to hide or interfere with data, while integrity protection usually needs to enable peer monitoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.