![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
An identity-based traceable ring signatures based on lattice
While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable to malicious signers in certain scenarios, for example, in electronic voting, malicious users will vote multip...
-
Chapter and Conference Paper
Optimization and Verification of Artificial Intelligence Image Recognition Algorithm for Transmission Line Defects
With the continuous improvement of intelligent operation and inspection requirements of transmission lines in power system, the popularization of online monitoring of transmission lines and uav inspection, a l...
-
Chapter and Conference Paper
A Novel Approach to Analyzing Defects: Enhancing Knowledge Graph Embedding Models for Main Electrical Equipment
The safety of electric power grids can be threatened by defects in main electrical equipment, creating significant risks and pressures for dispatching operations. To analyze defects in main electrical equipmen...
-
Chapter and Conference Paper
Improve Knowledge Graph Completion for Diagnosing Defects in Main Electrical Equipment
Defects in main electrical equipment can potentially cause power grid collapses, leading to catastrophic risks and immense pressure on dispatch operations. We adopt a Knowledge Graph Completion (KGC) approach ...
-
Chapter and Conference Paper
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search
Public-key Authenticated Encryption with Keyword Search (PAEKS) is a cryptographic primitive that can resist inside keyword guessing attack (KGA). However, most of the previously proposed PAEKS frameworks suff...
-
Chapter and Conference Paper
A Novel Certificateless Multi-signature Scheme over NTRU Lattices
With the help of multi-signature technology, multiple signatures on the same message could be compressed into one compact signature, which is efficient for financial applications such as blockchain for saving ...
-
Chapter and Conference Paper
Public Key Encryption with Fuzzy Matching
The rise of cloud computing is driving the development in various fields and becoming one of the hot topics in recent years. To solve the problem of comparing ciphertexts between different users in cloud stora...
-
Chapter and Conference Paper
Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test
In the cloud era people get used to store their data to the cloud server, and would use encryption technique to protect their sensitive data from leakage. However, encrypted data management is a challenging pr...
-
Article
Ein Fels in der Brandung in der Chinesischen Medizin Deutschlands
-
Chapter and Conference Paper
Self-Repairing of Damaged Rust Layers on Carbon Steel and Weathering Steel
Rust layer damage of the weathering steel is almost inevitable during its service and new rusts will form to fill the damage. This study focused on the rust self-repairing behavior of the weathering steel in t...
-
Chapter and Conference Paper
A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model
Due to the imperfect implementation of cryptosystems, adversaries are able to obtain secret state of the systems via side-channel attacks which are not considered in the traditional security notions of cryptograp...
-
Article
Open AccessImmunohistochemical detection of S100A1 in the postmortem diagnosis of acute myocardial infarction
Sudden cardiac death resulting from acute myocardial infarction (AMI) constitutes a significant percentage of the caseload for forensic and clinical pathologists. When sudden death occurs at an early stage (<6...