- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Advancements in Battery Materials
- Cloud Data Security Solutions
- Advanced Battery Materials and Technologies
- Supercapacitor Materials and Fabrication
- Advanced Authentication Protocols Security
- Vehicular Ad Hoc Networks (VANETs)
- Smart Grid Security and Resilience
- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- Security in Wireless Sensor Networks
- UAV Applications and Optimization
- User Authentication and Security Systems
- Advanced Steganography and Watermarking Techniques
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Distributed systems and fault tolerance
- Extraction and Separation Processes
- Complexity and Algorithms in Graphs
- FinTech, Crowdfunding, Digital Finance
- Cryptographic Implementations and Security
- Advanced Memory and Neural Computing
- Access Control and Trust
University of Münster
2025
Chinese Academy of Sciences
2020-2025
Beihang University
2021-2024
Chengdu University
2015-2024
China Railway Group (China)
2024
Universiti Teknologi MARA
2024
Guilin University of Electronic Technology
2017-2023
Zhengzhou University
2023
Central China Normal University
2023
University of Science and Technology of China
2023
Cloud storage system provides facilitative file and sharing services for distributed clients. To address integrity, controllable outsourcing, origin auditing concerns on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous over existing proposals in securing data. First, our IBDO allows a user to authorize dedicated proxies upload the cloud server her behalf, e.g., company may some employees files company's account...
With the rapid development of cloud computing, an increasing number individuals and organizations are sharing data in public cloud. To protect privacy stored cloud, a owner usually encrypts his such way that certain designated users can decrypt data. This raises serious problem when encrypted needs to be shared more people beyond those initially by owner. address this problem, we introduce formalize identity-based encryption transformation (IBET) model seamlessly integrating two...
With the establishment of intelligent transportation system (ITS), vehicular ad hoc networks (VANETs) play a significant role for improving traffic safety and efficiency. In order to avoid malicious attack resource abuse in VANETs, use digital signature scheme is widely regarded as first line defense achieve secure VANETs system. However, it still challenging task design conditional privacy preserving authentication scheme, resolve security privacy-preserving problems improve utilization...
Currently, the commercial separator (Celgard2500) of lithium-ion batteries (LIBs) suffers from poor electrolyte affinity, mechanical property and thermal stability, which seriously affect electrochemical performances safety LIBs. Here, composite separators named PVDF-HFP/TiN for high-safety LIBs are synthesized. The integration PVDF-HFP TiN forms porous structure with a uniform rich organic framework. significantly improves adsorption between electrolyte, causing higher absorption rate...
N/O/S co-regulates the surface trapping force of carbons, enabling fast and stable Na/K storage by adsorption weak intercalation.
Smart grid can greatly improve the efficiency, reliability, and sustainability of traditional grids. In industrial smart grid, real-time user-side metering data may be frequently collected for monitoring controlling electricity consumption. However, procedure collection lead to sensitive information leakage. To address security issues in this article, we construct an efficient identity-based aggregation scheme supporting batch verification by collector service provider, respectively, which...
Due to the rapid development of demand response management and distributed energy resources, prosumers are becoming more proactive, which also promotes emergence peer-to-peer (P2P) trading mechanisms. However, we find that it is quite difficult simultaneously achieve high computational efficiency, decentralized operations solution optimality in a P2P mechanism, called "P2P trilemma". In this paper, first propose novel negotiation mechanism for can maximize social welfare manner respect...
Hard carbons have broad prospects of application in potassium-ion batteries (PIBs) and sodium-ion (SIBs).
Fivefold twins are extensively present in nanoparticles and nanowires, enhancing their performance physical, chemical, mechanical properties. However, a deep insight into the correlation between properties fivefold bulk nanograined materials is lacking due to synthesis difficulties. Here, fivefold-twinned Ni synthesized via electrodeposition. The nanograins typically feature decahedral icosahedral shapes similar particles. material exhibits yield strength of ≈1.7 GPa under both compression...
Abstract Traditional machine learning requires collecting data from participants for training, which may lead to malicious acquisition of privacy in participants’ data. Federated provides a method protect by transferring the training process centralized server terminal devices. However, still obtain through inference attacks and other methods. In addition, provided varies quality, excessive involvement low-quality can render model unusable, is an important issue current mainstream federated...
Provable data possession (PDP) allows a user to outsource with guarantee that the integrity can be efficiently verified. Existing publicly verifiable PDP schemes require perform expensive computations, such as modular exponentiations for processing before outsourcing storage server, which is not desirable weak users limited computation resources. In this paper, we introduce and formalize an online/offline (OOPDP) model, divides procedure into offline online phases. OOPDP, most of...
A vehicular ad hoc network (VANET) is a special mobile that provides vehicle collaborative security applications using intervehicle communication technology. The method enables vehicles to exchange information (e.g., emergency brake). In VANET, there are many platoon driving scenes, where with identical attributes (location, organization, etc.) organized as group. However, this organization causes the issue of threats (message confidentiality, identity privacy, because an unsafe wireless...
Vehicle ad-hoc networks (VANETs) can offer numerous benefits, but also face many privacy and security issues. There exist the certificate management burden key escrow issue in traditional public infrastructure (PKI)-based identity (ID)-based privacy-preserving authentication schemes, respectively. In addition, of some existing cryptographic schemes depends on strong assumptions about ideal tamper-proof devices. To address these issues, a certificateless aggregate signature (CLAS) scheme for...
Abstract A composite of olivine lithium manganese iron phosphate (LiMn 0.5 Fe PO 4 ), external carbon coating and internal embedded flakes, EC-IC-LMFP, is prepared by using phytic acid (PhyA) as phosphorus source via solvothermal process followed calcination. The with improved electronic conductivity ion diffusivity presents an ultrahigh reversible specific capacity 193 mAh g −1 at 0.1 C, excellent cycling stability 93% retention after 100 cycles 1 C when applied a cathode material for...
As the next-generation grid, smart grid (SG) can significantly enhance reliability, flexibility as well efficiency of electricity services. To address latency and bandwidth issues during data analysis, there have been attempts to introduce fog computing (FC) in SG. However, computing-based (FCSG) face serious challenges security privacy. In this paper, we propose a privacy-preserving aggregation scheme that supports dynamic billing arbitration, named PPDB. Specifically, design four-layer...