![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Quantified emotion analysis based on design principles of color feature recognition in pictures
When people observe pictures, different pictures will generate different emotions, and the painters often convey emotional energy to the audience through the media. Through the effect of this emotional transfe...
-
Article
A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS
With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage, but has also extended to cloud database storage methods. To ...
-
Article
An IoT and blockchain based logistics application of UAV
With the increasing number of online consumers, the relationship between the Internet of things and the Internet is becoming closer. Logistics transportation plays an important role in the whole online shoppin...
-
Article
Special issue on “Recent advances on computational intelligence techniques and applications in big data”
-
Article
An anonymous and fair auction system based on blockchain
Consumer approval of the online auction paradigm is demonstrated by rapidly expanding online auction transaction volumes. Bidders can access a wider variety of products, and sellers can reach a larger audience...
-
Article
Open AccessMachine learning for trust, security, and privacy in computing and communications
-
Article
Blockchain-based alcoholic beverages supply chain management system
Nearly 3 million people die each year as a result of dangerous alcohol consumption, according to the World Health Organization, factoring for 5.3% of all deaths globally. Many international organizations and g...
-
Article
A blockchain-based intelligent anti-switch package in tracing logistics system
In recent years, with the rapid development of e-commerce and network technologies, many people do online shop** through the Internet. If a physical product is bought by a client, the store will entrust thei...
-
Article
A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing
In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because the...
-
Article
Open AccessA secure electronic medical record authorization system for smart device application in cloud computing environments
As cloud computing technology matures, along with an increased application of distributed networks, increasingly larger amounts of data are being stored in the cloud, and are thus available for pervasive appli...
-
Article
Research on effect of rings on coupling vibration in a rigid-disk rotor
This paper uses new deductions of the equation of motion and obtains new modes of change that differ from the authors’ previous research. The blade-bending, shaft-torsion and ring-bending coupled vibration inf...
-
Article
Influence of the barrier layer on the flexural properties of nanoporous alumina film
This study evaluated the influence that the barrier layer has on the flexural properties of anodic aluminium oxide (AAO) film. The flexural properties, including the bending strength and the bending modulus we...
-
Article
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
Three-party authenticated key exchange (3PAKE) protocol allows two communication users to authenticate each other and to establish a secure common session key with the help of a trusted remote server. Recently...
-
Article
A fair and secure group buying system based on arbitration computing mechanism
Trading is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain a reasonable profit. If friends or family of a b...
-
Article
A secure key authentication scheme for cryptosystems based on GDLP and IFP
The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fi...
-
Article
A Privacy Authentication Scheme Based on Cloud for Medical Environment
With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resource...
-
Article
Design and analysis of a secure and effective emergency system for mountaineering events
In recent years, the sport of mountaineering has become increasingly popular in many countries. Notably, during this activity, mountaineers are likely to enter into dangerous situations. In this paper, we prop...
-
Article
A Secure Medical Data Exchange Protocol Based on Cloud Environment
In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. ...
-
Article
A Secure Ambulance Communication Protocol for VANET
Vehicular ad hoc networks (VANETs) have been a research focus in recent years. VANET’s main applications are enhancing road safety and reducing traffic accidents. Moreover, the VANET system can also reduce the...
-
Article
A secure ownership transfer protocol using EPCglobal Gen-2 RFID
Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be ...