![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessRainbow: reliable personally identifiable information retrieval across multi-cloud
Personally identifiable information (PII) refers to any information that links to an individual. Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violati...
-
Article
Hashing multiple messages with SM3 on GPU platforms
-
Article
Open AccessServer-aided immediate and robust user revocation mechanism for SM9
As the only approved Identity-Based Encryption scheme in China that is also standardized by ISO, SM9-IBE has been widely adopted in many real-world applications. However, similar to other IBE standard algorith...
-
Chapter and Conference Paper
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls—Secure and Efficient Fine-Grained Access Control on Corrupted Machines
Attribute based encryption (ABE) has potential to be applied in various cloud computing applications. However, the Snowden revelations show that powerful adversaries can corrupt users’ machines to compromise t...
-
Article
Auto-ignition of biomass synthesis gas in shock tube at elevated temperature and pressure
Ignition delay times of multi-component biomass synthesis gas (bio-syngas) diluted in argon were measured in a shock tube at elevated pressure (5, 10 and 15 bar, 1 bar = 105 Pa), wide temperature ranges (1,100–1,...