Aiming at the issues of privacy security in Internet of Things(IoT)applications,we propose an effective risk assessment model to handle probabilistic causality of evaluation factors and derive weights
The anonymous communication systems usually have special traffic patterns,which can be detected by censors for further disturbing or blocking.To solve this prob
This paper analyzes the efficiency and security of bilinear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing,which
With the development of quantum computer,multivariate public key cryptography withstanding quantum attack has became one of the research focus.The existed signc
Identity-based key agreement protocol affords a natural way to combine the participant’s identity with its public key.However,most of them just consider the ke