L Zhao, L Chen - IEEE transactions on dependable and secure …, 2018 - ieeexplore.ieee.org
A Privacy-preserving Verifiable (outsourced) Computation (PVC) protocol enables a resource-constrained client to outsource expensive and sensitive workloads to …
Z Yang, W Yan, Y Xiang - IEEE Transactions on Emerging …, 2014 - ieeexplore.ieee.org
With the development of the cyber-physical systems (CPS), the security analysis of the data therein becomes more and more important. Recently, due to the advantage of joint …
Q Lin, KW Wong, J Chen - Journal of Systems and Software, 2013 - Elsevier
We enhance the simultaneous arithmetic coding and encryption scheme previously proposed by us. By encoding a block of variable number of symbols to a codeword within …
A Masmoudi, W Puech - IET Image Processing, 2014 - Wiley Online Library
In this study, the authors proposed a new scheme which performs both lossless compression and encryption of images. Lossless compression is done by arithmetic coding …
S Balaji, M Rajaram - Wireless Personal Communications, 2016 - Springer
An AdHoc network is a temporary network without any centralized agent or router, used for special purposes. A generalized group based approach delivers probabilities of existence of …
L Zhao, L Chen - IEEE Transactions on Dependable and …, 2023 - ieeexplore.ieee.org
Recently, a privacy-preserving technique called Privacy-Preserving Matrix Transformation (PPMT) is widely used to construct efficient privacy-preserving Verifiable (outsourced) …
Y Zhang, D Xiao, W Wen, H Nan, M Su - Communications in Nonlinear …, 2015 - Elsevier
In this paper, we propose a novel secure arithmetic coding based on digitalized modified logistic map (DMLM) and linear feedback shift register (LFSR). An input binary sequence is …