样式: 排序: IF: - GO 导出 标记为已读
-
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-03-15 Caihui Lan, Haifeng Li, Caifen Wang, Xiaodong Yang, Hailong Yao
Key-Aggregate Searchable (KASE) can enable a data owner to delegate search rights over a set of data files to multiple users through a single aggregated authorization key in multi-user data sharing environments. Despite the elegance of the KASE concept, designing a KASE scheme that simultaneously prevents authorization from being abused and resists offline keyword guessing attacks is a formidable challenge
-
Covert communication via blockchain: Hiding patterns and communication patterns Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-03-13 Tao Zhang, Qianhong Wu, Qin Wang, Tianxu Han, Bingyu Li, Yan Zhu
Blockchain technology has demonstrated promising potential for covert communication. Although a series of studies have investigated blockchain-based covert communication, systematic research on the information-hiding patterns and covert communication patterns built on the blockchain is absent. This paper aims to conduct a comprehensive analysis of the related patterns. Based on intensive investigation
-
Consensus algorithms based on collusion resistant publicly verifiable random number seeds Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-03-12 Ping Wang, Longhuai Cao, Yong Hu, Zhiwei Sun
Publicly verifiable random number seeds are widely used in distributed systems and applications, especially in consensus algorithms. The purpose was to distribute the tasks and benefits among the participants fairly. A secure and efficient consensus algorithm is the foundation and guarantee of blockchain. We have been working on more concise, fair, and secure blockchain consensus algorithms. In this
-
Is mouse dynamics information credible for user behavior research? An empirical investigation Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-03-04 Eduard Kuric, Peter Demcak, Matus Krajcovic, Peter Nemcek
Mouse dynamics, information on user’s interaction with a computer mouse, are in vogue in machine learning for purposes such as recommendations, personalization, prediction of user characteristics and behavioral biometrics. We point out a blind spot in current works involving mouse dynamics that originates in underestimating the gravity of the characteristics of the mouse device and configuration on
-
Multi-type requirements traceability prediction by code data augmentation and fine-tuning MS-CodeBERT Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-03-04 Ali Majidzadeh, Mehrdad Ashtiani, Morteza Zakeri-Nasrabadi
Requirement traceability is a crucial quality factor that highly impacts the software evolution process and maintenance costs. Automated traceability links recovery techniques are required for a reliable and low-cost software development life cycle. Pre-trained language models have shown promising results on many natural language tasks. However, using such pre-trained models for requirement traceability
-
Revocable certificateless Provable Data Possession with identity privacy in cloud storage Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-02-28 Kai Zhang, Zirui Guo, Liangliang Wang, Lei Zhang, Lifei Wei
Provable Data Possession (PDP) has gained widespread adoption for ensuring the integrity of data in remote cloud storage, where a data owner can delegate a third party auditor (TPA) to perform data auditing. To eliminate key escrow problem or complicated certificate management in classic solutions, numerous certificateless PDP schemes have been proposed while they failed to achieve efficient user revocation
-
Hybrid collaborative filtering using matrix factorization and XGBoost for movie recommendation Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-02-22 Gopal Behera, Sanjaya Kumar Panda, Meng-Yen Hsieh, Kuan-Ching Li
Nowadays, e-commerce platforms, such as Amazon, Flipkart, Netflix and YouTube, extensively use recommender systems (RS) techniques. Collaborative filtering (CF) is used widely among all RS techniques. A CF analyzes the user’s preference from past data, like ratings, and then suggests actual items to the intended user. The existing techniques compute the similarity between users/items and predict the
-
Detection of DDoS attacks in SDN-based VANET using optimized TabNet Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-02-18 Mohamed Ali Setitra, Mingyu Fan
Vehicular Ad Hoc Network (VANET) serves as a crucial component in developing the Intelligent Transport System (ITS), which provides a range of services expected to increase road safety and improve the global driving experience. At the same time, Software Defined Network (SDN) is a promising solution for VANET communication security due to the risk related to the dynamic nature of the vehicular network
-
Elliptic code-based oblivious polynomial evaluation Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-02-17 Yang Yang, Peidong Guan, Haibo Tian, Fangguo Zhang
Oblivious polynomial evaluation (OPE) constitutes a crucial element in various two-party computation protocols, including private set intersection, data mining, and oblivious keyword search. Consequently, the development of an efficient OPE protocol is of paramount significance. Leveraging the homomorphic properties of encryption algorithms offers an effective avenue for constructing such a protocol
-
A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-02-13 Zhihao Li, Qi Chen, Jin Li, Jiahui Huang, Weichuan Mo, Duncan S. Wong, Hai Jiang
Unmanned Aerial Vehicles (UAVs) are highly versatile and efficient tools utilized across diverse industries for data collection. However, they are vulnerable to wireless communication and data exchange risks, including unauthorized access, data theft, and network attacks. To address these problems, we introduce a secure and reliable UAV network service architecture that incorporates blockchain and
-
-
HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-01-20 Tao Li, Peiyao Niu, Yilei Wang, Shengke Zeng, Xiaoying Wang, Willy Susilo
-
Editorial Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-01-24 Ricardo Colomo-Palacios
Abstract not available
-
Patient-centric medical service matching with fine-grained access control and dynamic user management Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-01-19 Shu Wu, Aiqing Zhang, Ya Gao, Xiaojuan Xie
Personal health records (PHR) offer significant benefit for patients, such as reducing medical cost and improving the quality of medical care. Majority of the current schemes lack provisions for tracking and revoking malicious doctors. The explicit access policies are prone to leaking patient private information. What is more, owning to the uneven distribution of medical supplies, shocking computational
-
A critical analysis of Zero Trust Architecture (ZTA) Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-01-09 Eduardo B. Fernandez, Andrei Brazhuk
Zero Trust (ZT) has become a very hot approach for building secure systems, promoted by industry and government as a new way to produce systems with a high degree of security. ZT is based on not trusting any request for accessing resources. Because of the possibility of increasing the security of enterprise systems there has been a large amount of publication on different aspects of this strategy.
-
When deep learning meets watermarking: A survey of application, attacks and defenses Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-01-04 Huajie Chen, Chi Liu, Tianqing Zhu, Wanlei Zhou
Deep learning has been used to address various problems in a range of domains within both academia and industry. However, the issue of intellectual property with deep learning models has aroused broad attention. Watermarking, a proactive defense approach widely adopted to safeguard the copyright of digital content, is now sparking novel mechanisms for protecting the intellectual property of deep learning
-
Compact and efficient KEMs over NTRU lattices Comput. Stand. Interfaces (IF 5.0) Pub Date : 2024-01-02 Zhichuang Liang, Boyue Fang, Jieyu Zheng, Yunlei Zhao
The NTRU lattice is a promising candidate to construct practical cryptosystems, in particular key encapsulation mechanism (KEM), resistant to quantum computing attacks. Nevertheless, there are still some inherent obstacles to NTRU-based KEM schemes when considering integrated performance, taking security, bandwidth, error probability, and computational efficiency as a whole, that is as good as and
-
A heuristic design toolkit for web conferencing software based on self-determination theory Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-28 Ming Wu, Xiaohui Shen, Lekai Zhang, Xingyu Liu, Hailong Zhang, Yaqi Hu
Web conferencing software can help workers work remotely and provide them with greater flexibility and autonomy. However, existing web conferencing software faces certain technical, functional, and design-related limitations. These problems lead to a less than ideal user experience and consequently result in a lack of intrinsic motivation on the part of the user. To improve this situation, we conducted
-
Local differential privacy and its applications: A comprehensive survey Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-30 Mengmeng Yang, Taolin Guo, Tianqing Zhu, Ivan Tjuawinata, Jun Zhao, Kwok-Yan Lam
With the rapid development of low-cost consumer electronics and pervasive adoption of next generation wireless communication technologies, a tremendous amount of data has been generated from users’ smart devices and collected for research and analysis. This inevitably results in increasing concern of mobile users regarding their personal information; the problem of privacy preservation has become more
-
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-26 Lixia Xie, Bingdi Yuan, Hongyu Yang, Ze Hu, Laiwei Jiang, Liang Zhang, Xiang Cheng
To address the slow response time of existing detection modules to the Internet of Things (IoT) Distributed Denial of Service (DDoS) attacks, along with their low feature differentiation and poor detection performance, we propose MRFM, a timely detection method with multidimensional reconstruction and function mapping. Firstly, we employ a queue mechanism to capture and store incoming network traffic
-
MRAN: Multimodal relationship-aware attention network for fake news detection Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-27 Hongyu Yang, Jinjiao Zhang, Liang Zhang, Xiang Cheng, Ze Hu
Existing multimodal fake news detection methods face challenges in jointly capturing the intramodality and cross-modal correlation relationships between image regions and text fragments. Additionally, these methods lack comprehensive hierarchical semantics mining for text. These limitations result in ineffective utilization of multimodal information and impact detection performance. To address these
-
BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-19 Fanfan Shen, Lin Shi, Jun Zhang, Chao Xu, Yong Chen, Yanxiang He
The storage of electronic medical records (EMRs) is an area of extensive research, and healthcare systems often delegate this task to cloud service providers (CSP). Typically, CSP transmits the encrypted EMRs to a cloud server with a searchable encryption scheme for easy retrieval. However, the enormous power held by centralized CSP poses a potential threat to patients’ personal privacy, as it can
-
Privacy-preserving compromised credential checking protocol for account protection Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-16 Xiaopeng Yu, Dianhua Tang, Zhen Zhao, Wei Zhao
-
Fast intensive validation on blockchain with scale-out dispute resolution Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-16 Mingming Wang, Qianhong Wu
Blockchain heralds the dawn of decentralized applications that coordinate proper computations without requiring prior trust. Existing blockchain solutions, however, are incapable of dealing with intensive validation. Duplicated execution results in limited throughput and unacceptably high costs. Furthermore, the absence of secure incentive mechanisms derives undesired dilemmas among rational verifiers
-
FFEC: Fast and forward-secure equivalence-based ciphertext comparability for multiple users in cloud environment Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-16 Sha Ma, Zhiqing Ye, Qiong Huang, Chengyu Jiang
With the expansion of cloud computing, an increasing amount of sensitive data is being encrypted and stored in public clouds to alleviate storage and management burdens. Secure equivalence-based retrieval of ciphertexts for multiple users is crucial in a cloud environment where diverse user data resides for processing purposes. Public key encryption with equality test (PKEET) has been introduced as
-
Disentangling different levels of GAN fingerprints for task-specific forensics Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-16 Chi Liu, Tianqing Zhu, Yuan Zhao, Jun Zhang, Wanlei Zhou
Image generation using generative adversarial networks (GANs) has raised new security challenges recently. One promising forensic solution is verifying whether or not a suspicious image contains a GAN fingerprint, a unique trace left behind by the source GAN. Previous methods mainly focused on GAN fingerprint extraction while underestimating the downstream forensic applications, and the fingerprints
-
A new modified Skew Tent Map and its application in pseudo-random number generator Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-15 Talha Umar, Mohammad Nadeem, Faisal Anwer
Everyday, a vast amount of information is created and shared on the internet. Security steps and methods are needed to ensure the data is sent and stored safely. Random numbers are essential to cryptography because they are crucial to securing data. In recent years, the use of chaos theory has become increasingly important in producing pseudo-random number sequences in the field of cryptography. But
-
Secure decision tree classification with decentralized authorization and access control Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-02 Chen Wang, Jian Xu, Shanru Tan, Long Yin
-
Provably secure multi-signature scheme based on the standard SM2 signature scheme Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-12-05 Yuchen Xiao, Lei Zhang, Yafang Yang, Wei Wu, Jianting Ning, Xinyi Huang
The multi-signature scheme plays a crucial role in addressing trust and authentication challenges in digital transactions and other scenarios by allowing multiple users to sign the same message. Among various signature schemes, the SM2 signature scheme stands out for its exceptional security and efficiency, making it widely adopted in numerous fields. In this paper, we propose the first provably secure
-
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-11-29 Zi-Yuan Liu, Masahiro Mambo, Raylin Tso, Yi-Fan Tseng
Cloud-based data sharing systems (DSS) have become prevalent due to their ample storage and convenient access control. To protect sensitive data privacy in DSS, anonymous identity-based encryption (IBE) is a promising approach, enabling encryption using a recipient’s identity as a public key, while preventing identity and data leaks out of ciphertexts. As complete anonymity risks abuse and illegal
-
-
An efficient network intrusion detection approach based on logistic regression model and parallel artificial bee colony algorithm Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-11-21 Burak Kolukisa, Bilge Kagan Dedeturk, Hilal Hacilar, Vehbi Cagri Gungor
In recent years, the widespread use of the Internet has created many issues, especially in the area of cybersecurity. It is critical to detect intrusions in network traffic, and researchers have developed network intrusion and anomaly detection systems to cope with high numbers of attacks and attack variations. In particular, machine learning and meta-heuristic methods have been widely used for network
-
Lattice-based dynamic universal accumulator: Design and application Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-11-20 Yong Zhao, Shaojun Yang, Xinyi Huang
Dynamic universal accumulator is a crucial cryptography primitive. This type of accumulator can provide a succinct witness for a member (resp. nonmember) in order to make sure whether such member (resp. nonmember) is accumulated in a set, and supports deleting and adding operations from the accumulated set, as well as updating the existing witnesses. In recent years, lattice-based accumulator has given
-
StopGuess: A framework for public-key authenticated encryption with keyword search Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-11-03 Tao Xiang, Zhongming Wang, Biwen Chen, Xiaoguo Li, Peng Wang, Fei Chen
Public key encryption with keyword search (PEKS) allows users to search on encrypted data without leaking the keyword information from the ciphertexts. But it does not preserve keyword privacy within the trapdoors, because an adversary (e.g., untrusted server) might launch inside keyword-guessing attacks (IKGA) to guess keywords from the trapdoors. In recent years, public key authenticated encryption
-
New tag-based signatures and their applications on linearly homomorphic signatures Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-11-07 Chengjun Lin, Rui Xue, Xinyi Huang, Shaojun Yang
Tag-based signature schemes can be efficiently converted into digital signature schemes using a generic transformation. However, there is no signature scheme that admits k>1 fold tag-collisions in the lattice environment as pointed by Ducas and Micciancio (2014). This work answers this problem in the stateful case. We use homomorphic hash functions and hash functions of tags to construct a SIS-based
-
An extension of iStar for Machine Learning requirements by following the PRISE methodology Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-10-31 Jose M. Barrera, Alejandro Reina-Reina, Ana Lavalle, Alejandro Maté, Juan Trujillo
The rise of Artificial Intelligence (AI) and Deep Learning has led to Machine Learning (ML) becoming a common practice in academia and enterprise. However, a successful ML project requires deep domain knowledge as well as expertise in a plethora of algorithms and data processing techniques. This leads to a stronger dependency and need for communication between developers and stakeholders where numerous
-
Assessment of the Quality of the Text of Safety Standards with Industrial Semantic Technologies Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-10-30 Jose Luis de la Vara, Hector Bahamonde, Clara Ayora
Most safety-critical systems are subject to rigorous assurance processes to justify that the systems are dependable. These processes are typically conducted in compliance with safety standards, e.g., DO-178C for software in aerospace. This can be a prerequisite so that a system is allowed to operate. However, following these standards can be challenging in practice because of issues in their text such
-
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-10-30 B. Meenakshi, D. Karunkuzhali
Wireless sensor network (WSN) is a multi-hop and self-organizing wireless network consists of fixed or moving sensors, this is one of the key components of the cyber physical system. It jointly senses, gathers, analyses, and transfer the data of detected objects in the network's service area before sending this data to the network's owner. The attacks like, Black hole, Gray hole, Flooding, scheduling
-
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-10-26 Yi-Fan Tseng
Predicate encryption is well studied due to its flexibility in supporting fine-grained access control. In Katz et al. (2018) proposed a predicate encryption for a new predicate family, called subset predicate encryption. In such a scheme, a ciphertext and a private key are associated with sets. A private key can successfully decrypt a ciphertext if and only if the set for the private key is a subset
-
Key-aggregate based access control encryption for flexible cloud data sharing Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-10-17 Jinlu Liu, Jing Qin, Wenchao Wang, Lin Mei, Huaxiong Wang
Cloud computing has become the priority for users to store and share data due to its numerous tempting advantages. The “encryption-before-outsourcing” mechanism is necessary to protect data privacy against the semi-trusted cloud server. Key-Aggregate Cryptosystem (KAC) is a novel encryption paradigm for cloud data sharing. It enables users to decrypt multiple data encrypted with different keys using
-
An ontology-based secure design framework for graph-based databases Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-10-20 Manuel Paneque, María del Mar Roldán-García, Carlos Blanco, Alejandro Maté, David G. Rosado, Juan Trujillo
Graph-based databases are concerned with performance and flexibility. Most of the existing approaches used to design secure NoSQL databases are limited to the final implementation stage, and do not involve the design of security and access control issues at higher abstraction levels. Ensuring security and access control for Graph-based databases is difficult, as each approach differs significantly
-
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-10-14 Saurabh Shukla, Shahid Hussain, Reyazur Rashid Irshad, Ahmed Abdu Alattab, Subhasis Thakur, John G. Breslin, M Fadzil Hassan, Satheesh Abimannan, Shahid Husain, Syed Muslim Jameel
Existing technology like smart grid (SG) and smart meters play a significant role in meeting the everlasting demand of energy consumption, supply, and generation for peer-to-peer (P2P) energy trading between different distributed prosumers. Whereas blockchain when used with P2P energy trading plays a major role in cost and security by eliminating any involvement of outsiders and third parties. However
-
Online/offline remote data auditing with strong key-exposure resilience for cloud storage Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-10-13 Qingqing Gan, Xiaoming Wang, Daxin Huang, Jianwei Li, Changji Wang, Zhen Liu
Remote Data Auditing (RDA) with key-exposure resilience enables secure cloud data storage both earlier and later than the key exposure happens. However, most of existing solutions suffer from the security attack during the key-exposed time period, meaning the cloud server can still discard or tamper with the data owner’s files in the key-exposure period. While others require a secure channel for key
-
Sahand 1.0: A new model for extracting information from source code in object-oriented projects Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-10-10 Gholamali Nejad Hajali Irani, Habib Izadkhah
Providing models that enable developers, architects, and executives to make intelligent decisions about software projects is imperative. Static analyzer tools can extract the information required by developers from the source code to achieve various goals. There are generally two types of tools for analyzing source codes in the software engineering community: commercial tools and open-source tools
-
Self-tallying e-voting with public traceability based on blockchain Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-09-30 Yichao Lu, Huilin Li, Le Gao, Jiaxin Yu, Yong Yu, Hexing Su
In the post-epidemic era, the prevalence of remote collaborations in modern work environments highlight the importance of e-voting as a critical component in facilitating distributed decision-making. Most of the existing e-voting systems heavily rely on a centralized tally authority which requires a high degree of moral trust. However, this kind of architecture is insufficient for expected decentralization
-
Web service discovery: Rationale, challenges, and solution directions Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-09-25 Ahmet Vedat Tokmak, Akhan Akbulut, Cagatay Catal
Service Oriented Architecture (SOA) is a methodology that promotes cooperation between services with diverse, but connected functions. Web Service technology paved the way for microservice architecture as it is a feature of modern web applications that resulted from the rise of SOA. With the proliferation of self-contained services, the ease of finding has emerged as a critical concern. Due to the
-
Pairing-free public-key authenticated encryption with keyword search Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-09-20 Lisha Bai, Lei Yong, Zhixian Chen, Jun Shao
-
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-09-04 Kui Ma, Guoji Song, Yanwei Zhou, Ran Xu, Bo Yang
In recent years, due to the spread of infectious diseases such as COVID-19, people begin to use the electronic medical system to obtain remote diagnosis and treatment services, which improves the convenience of people’s lives. However, people are worried that their private information will be compromised when they use the electronic medical system. To solve the above problems, a large number of identity
-
LightBlocks: A trusted lightweight signcryption and consensus scheme for industrial IoT ecosystems Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-08-30 Pronaya Bhattacharya, Amod Kumar Tiwari, Ashwin Verma, Abdulatif Alabdulatif, Sudeep Tanwar, Ravi Sharma
Industrial Internet-of-Things (IIoT) plays a vital cog in Industry 4.0 design principles and has revolutionized the manufacturing process by shifting from traditional mechanical systems to smart automation. In IIoT, smart embedded sensors are placed strategically on machine parts, components, and devices. These sensors exchange data over open public channels (Internet), which poses high security and
-
Post-quantum secure group signature with verifier local revocation and backward unlinkability Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-08-30 Shuaining Gao, Xinjian Chen, Hongbo Li, Willy Susilo, Qiong Huang
Group signature supports users to generate signatures on behalf of the group. Verifier local revocation (VLR) is an important method to revoke a misbehaving user in group signature, which has attracted many researchers’ attention. However, the existing lattice-based group signature schemes with VLR either achieve only selfless anonymity, have revocation list of size linear with the number of revoked
-
-
Over-threshold multi-party private set operation protocols for lightweight clients Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-08-24 Liju Ma, Hao Wang, Ziyu Niu, Zhi Li, Lei Wu, Xiaochao Wei, Ye Su
The problem of private set operation (PSO) can realize the function of data set analysis on the premise of privacy protection, which has been widely concerned by researchers in academia and industry. Over-threshold multi-party private set operation (OT-MP-PSO) is a special class of PSO, where multiple parties hold their own private set respectively and want to securely compute which element appears
-
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-08-23 Saleha Saudagar, Rekha Ranawat
Vehicle ad hoc networks (VANETs) are gaining popularity because they can potentially increase traffic efficiency with road safety in cooperative intelligent transport systems (C-ITS). Effective vehicle deployment requires the identification of nodes providing false data. Researchers have focused much of their attention on an important issue called misbehaviour detection for disseminating false data
-
Adaptive optimized residual convolutional image annotation model with bionic feature selection model Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-08-08 Vikas Palekar, Sathish Kumar L
The advancements in Internet and Web 2.0 technologies resulted in the easier generation and distribution of digital images. Many images are stored without any form of significant labelling. This makes searching for desired images tedious and time-consuming, resulting in an increased demand for an effective image retrieval technique. Image annotation provides one or more labels to an image that describes
-
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-08-02 Anjali Rajak, Rakesh Tripathi
With the advancement of recent technologies, high-speed and secure internet connectivity is required for 5th-generation mobile networks. A massive number of smart devices connected to the networks generate a large amount of data. Consequently, increasing traffic has generated more strain on networks and devices. Therefore, to handle the huge amount of data generated by the various devices and to detect
-
Faster matrix approximate homomorphic encryption Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-07-23 Jifa Hu, Fuqun Wang, Kefei Chen
Approximate Homomorphic Encryption (AHE) becomes a research hot spot in homomorphic cryptography in recent years as it is widely used in neural network, deep learning and so on. Since matrix multiplication is frequently used in these applications, many researcher have studied on it. In this paper, we propose a new matrix approximate homomorphic encryption scheme with faster matrix homomorphic multiplication
-
Integrating the manufacturer usage description standard in the modelling of cyber–physical systems Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-07-22 Sara Nieves Matheu García, Adrián Sánchez-Cabrera, Enrico Schiavone, Antonio Skarmeta
The continuous growth of cyber–physical systems (CPS) attacks, especially due to the conflict in Ukraine, has highlighted the need for cybersecurity management mechanisms, due to the catastrophic consequences that a failure or attack on critical infrastructures such as power plants. Indeed, Gartner predicts that by 2025, 30% of critical infrastructures will suffer a cyberattack. In this context, defining
-
Efficient dynamic multi-client searchable encryption supporting fuzzy search Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-07-20 Shuqin Liu, Xialin Liu, Wanxuan Huang, Kai Du
Searchable symmetric encryption (SSE) enables the client to outsource its encrypted database to the untrusted server, while maintaining the ability to efficiently search over it. However, most of the existing solutions focus mainly on exact keyword search. That is, it will fail to fetch the desired result even though mild typos. To this end, SSE with fuzzy keyword search has attracted considerable
-
Create your own MUSE: A method for updating security level evaluation instruments Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-07-19 Mari Seeba, Abasi-amefon Obot Affia, Sten Mäses, Raimundas Matulevičius
Number of security evaluation instruments and security maturity models have been developed to evaluate the security level of organizations. These instruments provide results that can be compared with industry-based benchmarks and track the dynamics of organizations’ security posture internally. Threat landscape is constantly changing and security evaluation instruments should be updated accordingly
-
Round efficient privacy-preserving federated learning based on MKFHE Comput. Stand. Interfaces (IF 5.0) Pub Date : 2023-07-19 Wenchao Liu, Tanping Zhou, Long Chen, Hongjian Yang, Jiang Han, Xiaoyuan Yang
Federated learning (FL) was created with the intention of enabling collaborative training of models without the need for direct data exchange. However, data leakage remains an issue in FL. Multi-Key Fully Homomorphic Encryption (MKFHE) is a promising technique that allows computations on ciphertexts encrypted by different parties. MKFHE’s aptitude to handle multi-party data makes it an ideal tool for