Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
AuditPCH: Auditable Payment Channel Hub With Privacy Protection
IEEE Transactions on Information Forensics and Security (TIFS), Volume 20Pages 1251–1261https://doi.org/10.1109/TIFS.2024.3515820Anonymous Payment Channel Hub (PCH), one of the most promising layer-two solutions, settles the scalability issue in blockchain while guaranteeing the unlinkability of transacting parties. However, such developments bring conflicting requirements, i.e., ...
- research-articleJanuary 2023
VM-Studio: A Universal Crosschain Smart Contract Verification and Execution Scheme
Blockchain interoperability promotes value delivery, application expansion, and ecological compatibility across heterogeneous blockchain systems. However, the contract framework and virtual machine construction in these systems are significantly different,...
- bookOctober 2017
2: Handbook of Blockchain, Digital Finance, and Inclusion Cryptocurrency, FinTech, InsurTech, Regulation, ChinaTech, Mobile Security, and Distributed Ledger
Handbook of Digital Finance and Financial Inclusion: Cryptocurrency, FinTech, InsurTech, Regulation, ChinaTech, Mobile Security, and Distributed Ledger explores recent advances in digital banking and cryptocurrency, emphasizing mobile technology and ...
- bookAugust 2017
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 1: Cryptocurrency, FinTech, InsurTech, and Regulation
Handbook of Blockchain, Digital Finance, and Inclusion, Volume 1: Cryptocurrency, FinTech, InsurTech, and Regulation explores recent advances in digital banking and cryptocurrency, emphasizing mobile technology and evolving uses of cryptocurrencies as ...
- ArticleJuly 2012
A Pollution Attack to Public-key Watermarking Schemes
ICME '12: Proceedings of the 2012 IEEE International Conference on Multimedia and ExpoPages 230–235https://doi.org/10.1109/ICME.2012.73Public-key watermarking schemes are required to possess two desirable properties: allowing everyone to determine whether a watermark exists in an image or not and ensuring high detection probability in case of malicious modification. In this paper we ...
- ArticleNovember 2009
On Group Key Management for Secure Multicast Employing the Inverse Element
MINES '09: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security - Volume 01Pages 337–341https://doi.org/10.1109/MINES.2009.56Recently, Pour et al. proposed a group key management scheme for secure multicast, where each member is privately assigned a member secret, and the algebraic inverse element of this secret is assigned to others but not the member himself. The scheme is ...
- ArticleNovember 2009
Fooling Public-Key Watermarking Detectors with Optimal Color Noise
MINES '09: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security - Volume 01Pages 5–9https://doi.org/10.1109/MINES.2009.129Public-key watermarking methods should have two properties: (1) allowing everyone to determine whether a watermark exists in an image or not; (2) having a high detection probability in case of malicious modification. This paper proposes a pollution ...
- ArticleJuly 2009
Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection
ICWS '09: Proceedings of the 2009 IEEE International Conference on Web ServicesPages 67–74https://doi.org/10.1109/ICWS.2009.34This paper studies the scenario where data in business documents is aggregated by different entities via the use of web services in streamlined business processes. The documents are transported within the Simple Object Access Protocol (SOAP) messages ...
- research-articleJune 2006
Security analysis on a conference scheme for mobile communications
IEEE Transactions on Wireless Communications (TWC), Volume 5, Issue 6Pages 1238–1240https://doi.org/10.1109/TWC.2006.1638641The conference key distribution scheme (CKDS) enables three or more parties to derive a common conference key to protect the conversation content in their conference. Designing a conference key distribution scheme for mobile communications is a ...