The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the popularity of smartphones and the rapid development of mobile internet, smartphone becomes an important tool that store sensitive data of owner. Encryption naturally becomes a necessary means of protection. In certain situations, this is inadequate, as user may be coerced to hand over decryption keys or passwords of sensitive APP (AliPay) on mobile device. Therefore, only encryption cannot...
The publish/subscribe paradigm can be used to build IoT service communication infrastructure owing to its loose coupling and scalability. Its features of decoupling among event producers and event consumers make IoT services collaborations more real-time and flexible, and allow indirect, anonymous and multicast IoT service interactions. However, in this environment, the IoT service cannot directly...
Public key cryptography has been considered too expensive, in terms of resource requirements, for applications within personal area networks and larger wireless sensor networks. Approaches based on public key cryptography for encryption/decryption and key generation respectively have been overlooked as the devices have been considered too low power or resource scarce. In recent times with the explosion...
How to efficiently retrieve the images while preserving the user's privacy has gradually become a key problem in some applications such as Cloud storage, social networks. In this paper, a secure index used for image retrieval is constructed to protect the retrieval results being leaked to the malicious attackers. At first, inverted index is generated using visual words of images and then encrypted...
Signal processing in the encrypted domain has become a hot research topic, which enable signal processing tasks in a secure and privacy-preserving manner. Taken the fact that SURF (Speeded Up Robust Feature) has been widely utilized in various applications into account, SURF feature extraction method in the encrypted domain has been proposed in this paper. Because all steps must be implemented in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.