- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Chaos-based Image/Signal Encryption
- Particle accelerators and beam dynamics
- Plasma Diagnostics and Applications
- Smart Grid Energy Management
- Cloud Data Security Solutions
- Internet Traffic Analysis and Secure E-voting
- Complexity and Algorithms in Graphs
- Particle Accelerators and Free-Electron Lasers
- Structural Analysis and Optimization
- FinTech, Crowdfunding, Digital Finance
- Wireless Sensor Networks and IoT
- Microwave Engineering and Waveguides
- Numerical Methods and Algorithms
- User Authentication and Security Systems
- Wireless Communication Networks Research
- Caching and Content Delivery
- Mobile Agent-Based Network Management
- Electric Vehicles and Infrastructure
- Wireless Communication Security Techniques
- Gyrotron and Vacuum Electronics Research
- Advanced Decision-Making Techniques
Zhongyuan University of Technology
2021-2024
Guangxi University
2024
State Key Laboratory of Cryptology
2023-2024
University of Wollongong
2016-2019
Abstract There are a series of challenges in microgrid transactions, and blockchain technology holds the promise addressing these challenges. However, with increasing number users existing systems may struggle to meet growing demands for transactions. Therefore, this paper proposes an efficient secure consensus algorithm designed large-scale electricity The begins by utilizing Spectral clustering partition network into different lower-level set based on transaction characteristics nodes....
With the continuous development of blockchain technology and economy, applications have been well developed in multiple key areas. The demand for interoperability between different blockchains is also increasing. Cross-chain protocol has become a major approach to solve cross-chain problems by defining series processes standards. In response long transaction time, high costs, degree centralization most protocols, this paper proposes three-stage based on notary groups verification groups....
Traditional cloud-centric approaches to medical data sharing pose risks related real-time performance, security, and stability. Medical healthcare encounter challenges like silos, privacy breaches, transmission latency. In response these challenges, this paper introduces a blockchain-based framework for trustworthy in edge computing environments. Leveraging consortium blockchains, enables fine-grained access control data. Specifically, it addresses the real-time, multi-attribute...
Blockchain, as a distributed trust database, has been widely applied in the field of trustworthy sharing Internet Things (IoT) sensor data. A single hash mechanism achieved, to some extent, on-chain storage blockchain data, that is, consistency data on and off chain. However, it still faces potential security risks such collision attacks, short password rainbow table attacks. To address this issue, paper proposes resiliently secure model based mimic mechanism. Specifically, response may...
Conventional blockchain consensus protocols tailored for the Internet of Vehicles (IoV) usually face low transaction throughput, high latency, and elevated communication overhead issues. To address these issues, in this paper, we propose ESBCP, an efficient secure protocol IoV environment. Firstly, considering significant performance differences among nodes IoV, designed a model IoV. Roadside units execute trust evaluation mechanism to select high-quality vehicle process, thereby reducing...
ARIEL is the new TRIUMF facility for production of radioactive ion beams that will enable delivery three simultaneous RIB to ISAC experimental stations. Two additional target stations produce by using either a 50 kW proton or from 500 electrons via photofission. The electron beam driver going be MeV 10 mA CW superconducting linac. first stage e-linac installation completed and commissioning underway. paper present design characteristics, installation, strategy current results.
Following the success of cloud computing, it has been shown its importance to realize various access control models in storage setting. Chinese Wall is a traditional model business for solving conflict interest (CoI) problem, and would be very interesting achieve conflict-resistant system. However, does not ensure privacy users, may reveal user's interest, investment tendency, etc. Therefore, raises big challenge implement without compromising privacy. In this paper, we focus on apply while...
We present an access control encryption (ACE) scheme which enjoys advantages over previous works in several aspects. Our ensures not only compact ciphertext size but also small of keys installed each user the ACE system. Besides, to best our knowledge, is first implementation with decentralized sanitizers. Comparing constructions one sanitizer, more secure and reliable since it does suffer from single point failure. Considering security scheme, we two models catering no-read rule no-write...
In medical data sharing, the access control authorities of sharing entities and computing capabilities platforms are asymmetric. This asymmetry leads to poor patient over their data, privacy disclosure, difficulties in tracking sharing. aarticle proposes a cooperation model cloud chain (CMCC) for secure data. CMCC, power equivalence blockchain nodes limits authority between doctors patients Moreover, server is used store some node-side computations handed cloud, which addresses asymmetric...