The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the proliferation of mobile devices, spatial crowdsourcing is rising as a new paradigm that enables individuals to participate in tasks related to some locations in the physical world. Nevertheless, how to allocate these tasks to proper mobile users and improve communication efficiency are critical in spatial crowdsourcing. In this paper, we propose Fo-DSC, a fog-based deduplicated spatial crowdsourcing...
Proxy signature is a powerful cryptographic primitive for delegating the signing powers. In this paper, we propose a new construction of novel proxy signature scheme, in which the proxy signing efficiency is highly efficient. Specifically, we describe a new and efficient proxy signature scheme from DL assumption. Our construction makes use a exposure free chameleon hash function in the delegation...
Control flow obfuscation is an important way of software copyright protection, the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineering against software. In this paper we ropose an approach to implement control flow obfuscation using Windows structured exception handling mechanism. Programs are obfuscated by replacing...
With the development of the Internet, the security of personal information privacy has been widespread concern, from "Yan Zhao Men Incidentrdquo to "human search", personal information and privacy has become an urgent need for China to resolve. The paper described the concept of privacy, analyzed the insecurity of privacy under current network environment, and gives the effective protection...
Signcryption is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overheads than the signature-then-encryption approach. In 2005, Huang et al. proposed an identity-based ring signcryption scheme by combining the concepts of identity-based ring signature and signcryption together. However, their scheme...
Signcryption is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at a lower computational costs and communication overheads than the signature-then-encryption approach. Recently, two identity-based threshold signcryption schemes [12], [27] have been proposed by combining the concepts of identity-based threshold signature and signcryption together...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.