The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With cloud services, users can easily host their data in the cloud and retrieve the part needed by search. Searchable encryption is proposed to conduct such process in a privacy-preserving way, which allows a cloud server to perform search over the encrypted data in the cloud according to the search token submitted by the user. However, existing works mainly focus on textual data and merely take numerical...
With the cloud storage services, users can easily form a group and share data with each other. Public auditing scheme for shared data (PASSD) allows users or a third party to verify the integrity of the shared data in the cloud. However, the verification process of PASSD needs to compute a substantial number of bilinear pairings, which are also the fundamental of many other cryptographic protocols...
In recent years, with the growing popularity of smart phone and the developing of mobile communication, public transport card recharge system based on smart phone was designed to make it easier and convenient for people to go out. This system has two different realization methods, one for NFC smart phone and the other for non-NFC smart phone. People can recharge their public transport cards anytime...
Solving large-scale systems of linear equations (L-SLE) is a common scientific and engineering computational task. But such problem involves enormous computing resources, which is burdensome for the resource-limited clients. Cloud computing enables computational resource-limited clients to economically outsource such problems to the cloud server. However, outsourcing LSLE to the cloud brings great...
To protect the privacy of cloud data, searchable encryption is proved to be an important technique since it enables cloud users to search on encrypted data. Existing solutions for searchable encryption mainly focus on some basic search functions such as boolean search, similarity search or limited wildcard-based search. They cannot properly support the advanced search type: structured queries with...
SQL-Injection is an attack for Web applications which are based on database system, and it is one of the most serious security threats for Web application. This paper proposes a new middle-ware-based prevention mechanism: SQLIMW. The SQLIMW avoids SQL-Injection attack from the programmer to the server, and use HASH function to replace encryption. Furthermore, it protects username, password and private...
Location based services (LBS) is one of the fastest growing areas in recent years. Location update of mobile clients is fundamental in all types of LBS. But algorithms proposed in this field generally didn't concern the restricted context of road network and caused some unnecessary update. This paper proposed a revised vector-based update algorithm which taking characteristics of road network into...
Privacy preserving in location-based service (LBS) has been an important issue in Vehicular Ad hoc Network (VANET). Traditional k-anonymity algorithm dealing with location privacy protecting problem does not consider vehicle's mobility and inner collaborator. In this paper, we propose a new algorithm which uses dynamic and mobile aware anonymous peer selecting algorithm to improve the anonymity and...
Data caching is an important technique in wireless ad hoc networks, where it can increase data availability and significantly improve the efficiency of information access by reducing the access latency and bandwidth usage. However, designing efficient caching algorithms is non-trivial when network nodes have limited memory. After analyzing the benefit function of DGA (distributed greedy algorithm)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.