期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
An Anonymous Authentication Scheme with Controllable Linkability for Vehicle Sensor Networks 被引量:1
1
作者 yousheng zhou Lvjun Chen +1 位作者 Xiaofeng Zhao Zheng Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第12期1101-1118,共18页
Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible... Vehicle sensor networks(VSN)play an increasingly important part in smart city,due to the interconnectivity of the infrastructure.However similar to other wireless communications,vehicle sensor networks are susceptible to a broad range of attacks.In addition to ensuring security for both data-at-rest and data-in-transit,it is essential to preserve the privacy of data and users in vehicle sensor networks.Many existing authentication schemes for vehicle sensor networks are generally not designed to also preserve the privacy between the user and service provider(e.g.,mining user data to provide personalized services without infringing on user privacy).Controllable linkability can be used to facilitate an involved entity with the right linking key to determine whether two messages were generated by the same sender,while preserving the anonymity of the signer.Such a functionality is very useful to provide personalized services.Thus,in this paper,a threshold authentication scheme with anonymity and controllable linkability for vehicle sensor networks is constructed,and its security is analyzed under the random oracle model. 展开更多
关键词 Threshold authentication controllable linkabilty group signature vehicle sensor networks
下载PDF
A time-aware searchable encryption scheme for EHRs 被引量:1
2
作者 yousheng zhou Xiaofeng Zhao +2 位作者 Siling Liu Xingwang Long Wenjun Luo 《Digital Communications and Networks》 SCIE 2019年第3期170-175,共6页
Despite the benefits of EHRs (Electronic Health Records), there is a growing concern over the risks of privacy exposure associated with the technologies of EHR storing and transmission. To deal with this problem, a ti... Despite the benefits of EHRs (Electronic Health Records), there is a growing concern over the risks of privacy exposure associated with the technologies of EHR storing and transmission. To deal with this problem, a timeaware searchable encryption with designated server is proposed in this paper. It is based on Boneh's public key encryption with keyword search and Rivest's timed-release cryptology. Our construction has three features: the user cannot issue a keyword search query successfully unless the search falls into the specific time range;only the authorized user can generate a valid trapdoor;only the designated server can execute the search. Applying our scheme in a multi-user environment, the number of the keyword ciphertexts would not increase linearly with the number of the authorized users. The security and performance analysis shows that our proposed scheme is securer and more efficient than the existing similar schemes. 展开更多
关键词 Searchable ENCRYPTION Timed-release Designated server PRIVACY PRESERVING EHRs
下载PDF
浙江田螺山遗址剖面记录的水文环境变化 被引量:6
3
作者 黄宪荣 郑洪波 +7 位作者 胡竹君 杨青 孙国平 凌光久 周友胜 成玥 曹叶婷 王平 《科学通报》 EI CAS CSCD 北大核心 2019年第9期963-976,共14页
浙江余姚田螺山遗址是新石器时代河姆渡文化的一处保存良好的代表性遗址,为研究宁绍平原地区古环境变化及其对文化聚落的影响提供了良好的材料.本研究在田螺山遗址T005探方的西壁获取了厚达263 cm的连续地层剖面,对样品进行了系统的岩... 浙江余姚田螺山遗址是新石器时代河姆渡文化的一处保存良好的代表性遗址,为研究宁绍平原地区古环境变化及其对文化聚落的影响提供了良好的材料.本研究在田螺山遗址T005探方的西壁获取了厚达263 cm的连续地层剖面,对样品进行了系统的岩性地层描述、加速器质谱(AMS)^(14)C测年、高分辨率XRF(X射线荧光光谱分析)元素扫描、硅藻和粒度的综合分析.研究结果表明,该剖面反映的环境演变过程可以分为3个阶段:(1)河姆渡第一、二期文化时期(265~211 cm,约7.0~6.5 cal ka BP),该层堆积混杂,砂含量较高,含石块及陶片,受人类活动影响明显,具有海相性指示意义的Ca元素强度相对较低,优势硅藻种为淡水需氧气生种,指示了淡水的沼泽环境,受海水影响较小;(2)文化层之上为黏土质粉砂与白灰色砂互层的平行层理,与下覆文化层为不整合接触,沉积厚度达183 cm(211~28 cm),年代约4.2~4.0 cal ka BP, Ca元素强度较高,硅藻组合中优势种为咸水和半咸水种,推测该时期可能为风暴潮引起的洪水的快速沉积;(3)第三阶段(28~0 cm)为混杂堆积,含较多铁锰氧化物斑点, Ca元素强度低,硅藻主要属种为淡水附生种,可能为现代水稻田环境.本研究主要揭示了田螺山遗址7.0~6.5 cal ka BP的水文环境背景以及4.2 cal ka BP左右的事件沉积,对深入了解田螺山遗址先民生活的环境背景及区域极端事件具有重要意义. 展开更多
关键词 田螺山遗址 洪水 X射线荧光光谱分析 硅藻
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部