期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
τ-Access Policy:Attribute-Based Encryption Scheme for Social Network Based Data Trading 被引量:1
1
作者 Shamsher Ullah Lan Zhang +1 位作者 Muhammad Wasif Sardar Muhammad Tanveer Hussain 《China Communications》 SCIE CSCD 2021年第8期183-198,共16页
The rapid development of social technology has replaced physical interaction in the trading market.The implication of this technology is to provide access to the right information at the right time.The drawback of the... The rapid development of social technology has replaced physical interaction in the trading market.The implication of this technology is to provide access to the right information at the right time.The drawback of these technologies is that the eavesdropper can remove the user from the network and can create proxy participants.In this paper,we discuss how a social network overcome and prevent these data trading issues.To maintain the security of data trading,we applied ABE technique based on DBDH to secure data trading network.Our proposedτ-access policy scheme provides the best solution for the betterment of data trading network in terms of security.Inτ-access policy scheme,the users can encrypt and decrypt Private Transactions Information(PTI)using our proposedτ-access policy.The security properties ofτ-access policy are data confidentiality,data integrity,authenticity,non-repudiation,and unforgeability.The efficiency of our scheme is 77.73%,which is more suitable for data trading markets and trading strategies. 展开更多
关键词 ABE privacy integrity data trading PTI τ-access policy
下载PDF
Chaotic Properties in the Sense of Furstenberg Families in Set-Valued Discrete Dynamical Systems
2
作者 Xiaofang Yang Yongxi Jiang Tianxiu Lu 《Open Journal of Applied Sciences》 2021年第3期343-353,共11页
Let <img alt="" src="Edit_6a94976d-35be-4dd4-b74f-d0bf6f497453.png" />be a non-autonomous discrete system and <img alt="" src="Edit_3516e048-3d23-4ae8-81ac-e7e732efbc89... Let <img alt="" src="Edit_6a94976d-35be-4dd4-b74f-d0bf6f497453.png" />be a non-autonomous discrete system and <img alt="" src="Edit_3516e048-3d23-4ae8-81ac-e7e732efbc89.png" /> be a set-valued discrete system induced by it. Where, <img alt="" src="Edit_f67612c1-bbf4-4c21-8b37-7d156ca9502d.png" />is the space formed by all non-empty compact subsets of <em>X</em> endowed with the Hausdorff metric <em>H</em>, <img alt="" src="Edit_cca16788-f64a-47c4-9645-e9c8cf9080fd.png" />is a set-valued mapping sequence induced by <img alt="" src="Edit_5a6d2e7f-3245-4dbd-98ec-dc977e23f3d8.png" />. It is proved that <img alt="" src="Edit_a25ef428-a2ff-46d5-9109-dcc67b57fbec.png" /> is <img alt="" src="Edit_ee8759ba-215c-4088-8590-db9f57eb4a7c.png" />-chaos, then  <img alt="" src="Edit_f54b347a-033e-43e2-a3a1-d2fe5ac1f39d.png" />is <img alt="" src="Edit_72a57e59-dc43-4071-b0fe-432e379ddcc9.png" />-chaos. Where <img alt="" src="Edit_97813401-14af-4776-99fe-1e6cd08c3df1.png" />-chaos is denoted to <img alt="" src="Edit_9e2d88b4-7ece-430e-8978-800ff3280799.png" />-sensitive, <img alt="" src="Edit_440b79c1-f679-4571-b14d-6f804f402d75.png" />-sensitive, <img alt="" src="Edit_839b7b55-9961-4d80-b5cb-e7219a0ae871.png" />-transitive, <img alt="" src="Edit_feb0a032-255b-4cbd-b489-6a937c5a287a.png" />-accessible, <img alt="" src="Edit_3ba59c02-6df0-4ae1-8ac0-5c1b620e4a88.png" />-weakly mixing, <img alt="" src="Edit_7362ed03-8686-4cf7-94df-f0933b7abbff.png" />-<em>m</em>-sensitive, infinitely sensitive, or syndetically transitive. 展开更多
关键词 Furstenberg Family Non-Autonomous Discrete System F -Sensitive F -Transitive F -accessible F -Weakly Mixing F -m-Sensitive
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部