You are currently on the new version of our website. Access the old version .

80 Results Found

  • Article
  • Open Access
1 Citations
691 Views
14 Pages

21 June 2025

To solve the fundamental problem of excessive consumption of classical resources and the simultaneous security vulnerabilities in semi-quantum dialogue systems, a multi-party controlled semi-quantum dialogue protocol based on hyperentangled Bell stat...

  • Article
  • Open Access
5 Citations
2,183 Views
18 Pages

4 February 2021

As research on quantum computers and quantum information transmission deepens, the multi-particle and multi-mode quantum information transmission has been attracting increasing attention. For scenarios where multi-parties transmit sequentially increa...

  • Article
  • Open Access
1 Citations
801 Views
31 Pages

Secure Computation Schemes for Mahalanobis Distance Between Sample Vectors in Combating Malicious Deception

  • Xin Liu,
  • Weitong Chen,
  • Xinyuan Guo,
  • Dan Luo,
  • Lanying Liang,
  • Baohua Zhang and
  • Yu Gu

29 August 2025

In the context of rapid advancements in big data and artificial intelligence, similarity measurement methods between samples have been widely applied in data mining, pattern recognition, medical diagnosis, financial risk control, and other fields. Th...

  • Article
  • Open Access
11 Citations
2,928 Views
25 Pages

Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation

  • Reshma Siyal,
  • Jun Long,
  • Muhammad Asim,
  • Naveed Ahmad,
  • Hanaa Fathi and
  • Mohammad Alshinwan

24 June 2024

Ensuring data confidentiality is a critical requirement for modern security systems globally. Despite the implementation of various access-control policies to enhance system security, significant threats persist due to insecure and inadequate access...

  • Article
  • Open Access
1,517 Views
20 Pages

The adoption of kiosks in public spaces is steadily increasing, with a trend toward providing more natural user experiences through embodied conversational agents (ECAs). To achieve human-like interactions, ECAs should be able to appropriately gaze a...

  • Article
  • Open Access
835 Views
22 Pages

Research on Data Ownership and Controllable Sharing Schemes in the Process of Logistics Data Flow

  • Ziqi Liu,
  • Zhanling Shi,
  • Wenjing Wang,
  • Rui Kong,
  • Deqian Fu and
  • Jianlong Qiu

The secure and effective dissemination of logistics data is frequently obstructed by issues pertaining to ownership verification and unwanted access during data exchange. This study introduces an innovative strategy for data ownership verification an...

  • Article
  • Open Access
6 Citations
3,637 Views
16 Pages

22 April 2022

With the popularity of smart home services, smart home devices are also increasing significantly. At the same time, security problems of smart home services are becoming more and more important. With the characteristics of non-tampering and multi-par...

  • Article
  • Open Access
7 Citations
3,376 Views
18 Pages

A Security Management and Control Solution of Smart Park Based on Sensor Networks

  • Yue Zhao,
  • Bo Tian,
  • Yiru Niu,
  • Hao Zhang,
  • Zhongqiang Yi and
  • Ruiqi Zeng

13 October 2021

As a typical application of sensor networks, there exist many information security problems in smart parks, such as confusion of personnel access, lack of security management, disorderly data flow, insufficient collection of audit evidence, and so on...

  • Article
  • Open Access
781 Views
17 Pages

Enhancing Secure Multi-Party Computation with Damgård–Jurik and NIZK Proofs: A Lightweight Protocol for Scalable Aggregation

  • Julio Fenner-López,
  • Carlos Castillo-Muñoz,
  • Francisco Escobar-Jara,
  • Ana Bustamante-Mora and
  • María Burgos-López

24 September 2025

Privacy-preserving secure multi-party computation protocols are known to face scalability and efficiency challenges in environments where participants hold distinct attributes of the same records (vertical partitioning) or controls a subset of comple...

  • Article
  • Open Access
3 Citations
9,766 Views
19 Pages

Shared-Custodial Wallet for Multi-Party Crypto-Asset Management

  • Yimika Erinle,
  • Yebo Feng,
  • Jiahua Xu,
  • Nikhil Vadgama and
  • Paolo Tasca

31 December 2024

Blockchain wallets are essential interfaces for managing digital assets and authorising transactions within blockchain systems. However, typical blockchain wallets often encounter performance, privacy and cost issues when utilising multi-signature sc...

  • Article
  • Open Access
2 Citations
3,888 Views
19 Pages

In recent years, many companies have chosen to outsource data and other data computation tasks to cloud service providers to reduce costs and increase efficiency. However, there are risks of security and privacy breaches when users outsource data to...

  • Article
  • Open Access
526 Views
17 Pages

3 October 2025

The value of personal data can only be unlocked through efficient circulation. This study explores a multi-party collaborative mechanism for personal-data trading, aiming to improve data quality and market vitality via incentive-compatible institutio...

  • Article
  • Open Access
9 Citations
1,357 Views
20 Pages

Optimization of Operation Strategy of Multi-Islanding Microgrid Based on Double-Layer Objective

  • Zheng Shi,
  • Lu Yan,
  • Yingying Hu,
  • Yao Wang,
  • Wenping Qin,
  • Yan Liang,
  • Haibo Zhao,
  • Yongming Jing,
  • Jiaojiao Deng and
  • Zhi Zhang

14 September 2024

The shared energy storage device acts as an energy hub between multiple microgrids to better play the complementary characteristics of the microgrid power cycle. In this paper, the cooperative operation process of shared energy storage participating...

  • Article
  • Open Access
5 Citations
4,028 Views
18 Pages

Towards a Modular On-Premise Approach for Data Sharing

  • João S. Resende,
  • Luís Magalhães,
  • André Brandão,
  • Rolando Martins and
  • Luís Antunes

28 August 2021

The growing demand for everyday data insights drives the pursuit of more sophisticated infrastructures and artificial intelligence algorithms. When combined with the growing number of interconnected devices, this originates concerns about scalability...

  • Article
  • Open Access
12 Citations
3,519 Views
20 Pages

12 December 2023

This paper explicitly focuses on utilizing blockchain technology in dynamic consent management systems with privacy considerations. While blockchain offers improved security, the potential impact on entities’ privacy must be considered. Through...

  • Feature Paper
  • Article
  • Open Access
9 Citations
3,992 Views
18 Pages

Privacy-Preserving Overgrid: Secure Data Collection for the Smart Grid

  • Daniele Croce,
  • Fabrizio Giuliano,
  • Ilenia Tinnirello and
  • Laura Giarré

16 April 2020

In this paper, we present a privacy-preserving scheme for Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed Demand Response (DR) schemes in a community of smart buildings with en...

  • Article
  • Open Access
1 Citations
1,450 Views
26 Pages

Public Authentic-Replica Sampling Mechanism in Distributed Storage Environments

  • Jiale Ye,
  • Yongmei Bai,
  • Jiang Xu,
  • Shitao Huang,
  • Zhaoyang Han and
  • Wei Wan

23 October 2024

With the rapid development of wireless communication and big data analysis technologies, the storage of massive amounts of data relies on third-party trusted storage, such as cloud storage. However, once data are stored on third-party servers, data o...

  • Article
  • Open Access
7 Citations
4,137 Views
18 Pages

In bioinformatics, genome-wide association studies (GWAS) are used to detect associations between single-nucleotide polymorphisms (SNPs) and phenotypic traits such as diseases. Significant differences in SNP counts between case and control groups can...

  • Article
  • Open Access
6 Citations
3,191 Views
23 Pages

15 October 2022

Compared with traditional physical commodities, data are intangible and easy to leak, and the related trading process has problems, such as complex participating roles, lengthy information flow, poor supervisory coverage and difficult information tra...

  • Article
  • Open Access
3 Citations
4,394 Views
18 Pages

6 February 2023

The world is facing the challenge of increasing grain production and improving the environment, in which the treatment of diffuse water pollution from agriculture is the important content. Traditional administrative means are still unable to solve th...

  • Article
  • Open Access
954 Views
21 Pages

A Blockchain-Enabled Decentralized Autonomous Access Control Scheme for Data Sharing

  • Kunyang Li,
  • Heng Pan,
  • Yaoyao Zhang,
  • Bowei Zhang,
  • Ying Xing,
  • Yuyang Zhan,
  • Gaoxu Zhao and
  • Xueming Si

22 August 2025

With the rapid development of artificial intelligence, multi-party collaboration based on data sharing has become an inevitable trend. However, in practical applications, shared data often originate from multiple providers. Therefore, achieving secur...

  • Article
  • Open Access
16 Citations
4,536 Views
31 Pages

13 January 2020

In the current distributed manufacturing environment, more extensive enterprise cooperation is an effective means for shipbuilding companies to increase the competitiveness. However, considering the project scale and the uneven production capacity be...

  • Article
  • Open Access
2 Citations
5,076 Views
35 Pages

19 September 2024

This paper presents two innovative approaches: a synchronous multi-party dialogue system that engages in simultaneous interactions with multiple users, and multi-group simulations involving virtual user groups to evaluate the resilience of this syste...

  • Article
  • Open Access
2 Citations
2,383 Views
19 Pages

9 June 2021

Focusing on the diversified demands of location privacy in mobile social networks (MSNs), we propose a privacy-enhancing k-nearest neighbors search scheme over MSNs. First, we construct a dual-server architecture that incorporates location privacy an...

  • Article
  • Open Access
7 Citations
2,434 Views
15 Pages

23 May 2023

In order to study the heterogeneous traffic environment generated by connected automated vehicles (CAVs) and human-driven vehicles (HDVs), the car-following model and basic graph model of the mixed traffic flows of connected automated vehicles and hu...

  • Article
  • Open Access
24 Citations
3,846 Views
27 Pages

(1) Background: Under the background of building a new pattern of “double cycle” development, the green meaning of the digital economy is highly valued. The innovative feature of the digital economy is forming a new economic growth pole,...

  • Article
  • Open Access
13 Citations
6,408 Views
12 Pages

Privacy-Preserving Data Sharing in Telehealth Services

  • Ammar Odeh,
  • Eman Abdelfattah and
  • Walid Salameh

22 November 2024

In today’s healthcare industry, safeguarding patient data is critical due to the increasing digitization of medical records, which makes them vulnerable to cyber threats. Telehealth services, while providing immense benefits in terms of accessi...

  • Article
  • Open Access
1,117 Views
24 Pages

6 August 2025

Proxy re-signature enables transitive authentication of digital identities across different domains and has significant application value in areas such as digital rights management, cross-domain certificate validation, and distributed system access c...

  • Article
  • Open Access
789 Views
21 Pages

22 October 2025

As an important part of the circular economy, recycling old garments not only lessens resource waste, but also offers significant social benefits and environmental conservation. Taking Hefei City, Anhui Province, China, as a case, this study adopted...

  • Article
  • Open Access
4 Citations
2,086 Views
18 Pages

A major railway project is a complex, giant system with multi-party participation, one characterized by complex geological conditions, long construction periods and large scale, which leads to an increased likelihood of safety risk events during cons...

  • Review
  • Open Access
11 Citations
3,671 Views
18 Pages

Urban sprawl is a development theme of cities all over the world, especially in developing countries with rapid urbanization, and the long-established rough and outward urban growth pattern has brought about a series of social and ecological problems...

  • Article
  • Open Access
8 Citations
2,008 Views
21 Pages

25 December 2024

The development of medical data and resources has become essential for enhancing patient outcomes and operational efficiency in an age when digital innovation in healthcare is becoming more important. The rapid growth of the Internet of Medical Thing...

  • Article
  • Open Access
1 Citations
1,385 Views
26 Pages

Controlled Double-Direction Cyclic Quantum Communication of Arbitrary Two-Particle States

  • Nueraminaimu Maihemuti,
  • Zhanheng Chen,
  • Jiayin Peng,
  • Yimamujiang Aisan and
  • Jiangang Tang

11 March 2025

With the rapid development of quantum communication technologies, controlled double-direction cyclic (CDDC) quantum communication has become an important research direction. However, how to choose an appropriate quantum state as a channel to achieve...

  • Article
  • Open Access
51 Citations
4,416 Views
18 Pages

Spatial Differentiation of Non-Grain Production on Cultivated Land and Its Driving Factors in Coastal China

  • Yan Sun,
  • Yuanyuan Chang,
  • Junna Liu,
  • Xiaoping Ge,
  • Gang-Jun Liu and
  • Fu Chen

25 November 2021

The rapid development of urbanization and industrialization in coastal China in the past 20 years has exerted a huge squeezing effect on agricultural land use. The phenomenon of non-grain production on cultivated land (NGP) is very common, seriously...

  • Article
  • Open Access
2 Citations
1,879 Views
32 Pages

30 May 2025

Ecological restoration and brownfield reuse are important issues in the current field of urban sustainable development and environmental protection. This paper adopts bibliometric and network analysis methods, using more than 600 literature from Web...

  • Article
  • Open Access
8 Citations
2,604 Views
19 Pages

A Lightweight Secure Scheme for Underwater Wireless Acoustic Network

  • Jia Shi,
  • Jinqiu Wu,
  • Zhiwei Zhao,
  • Xiaofei Qi,
  • Wenbo Zhang,
  • Gang Qiao and
  • Dahong Zuo

Due to the open underwater channels and untransparent network deployment environments, underwater acoustic networks (UANs) are more vulnerable to hostile environments. Security research is also being conducted in cryptography, including authenticatio...

  • Article
  • Open Access
5 Citations
3,355 Views
20 Pages

2 October 2020

Nowadays, many political campaigns are using social influence in order to convince voters to support/oppose a specific candidate/party. In election control via social influence problem, an attacker tries to find a set of limited influencers to start...

  • Article
  • Open Access
14 Citations
3,068 Views
20 Pages

30 June 2020

The introduction of third-party governance models for the treatment of soil heavy metal pollution has promoted the marketization, professionalization, and efficiency of pollution treatment, but also can result in distortions of relevant stakeholder r...

  • Article
  • Open Access
5 Citations
2,850 Views
25 Pages

Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms

  • Santosh Kumar Henge,
  • Gnaniyan Uma Maheswari,
  • Rajakumar Ramalingam,
  • Sultan S. Alshamrani,
  • Mamoon Rashid and
  • Jayalakshmi Murugan

21 May 2023

This article discusses the importance of cross-platform UX/UI designs and frameworks and their effectiveness in building web applications and websites. Third-party libraries (TPL) and plug-ins are also emphasized, as they can help developers quickly...

  • Article
  • Open Access
5 Citations
2,139 Views
19 Pages

Collaborative Control of UAV Swarms for Target Capture Based on Intelligent Control Theory

  • Yuan Chi,
  • Yijie Dong,
  • Lei Zhang,
  • Zhenyue Qiu,
  • Xiaoyuan Zheng and
  • Zequn Li

26 January 2025

Real-time dynamic capture of a single moving target is one of the most crucial and representative tasks in UAV capture problems. This paper proposes a multi-UAV real-time dynamic capture strategy based on a differential game model to address this cha...

  • Article
  • Open Access
3 Citations
2,766 Views
24 Pages

22 February 2021

By employing ecological economics involving performance-influencing factors and third-party governance services that have the aim of reducing environmental pollution, a theoretical framework which includes object, subject, process that measures the p...

  • Article
  • Open Access
78 Citations
7,275 Views
16 Pages

Blockchain-Based Secured Access Control in an IoT System

  • Sultan Algarni,
  • Fathy Eassa,
  • Khalid Almarhabi,
  • Abduallah Almalaise,
  • Emad Albassam,
  • Khalid Alsubhi and
  • Mohammad Yamin

17 February 2021

The distributed nature of Internet of Things (IoT) and its rapid increase on a large scale raises many security and privacy issues. Access control is one of the major challenges currently addressed through centralized approaches that may rely on a th...

  • Article
  • Open Access
1,704 Views
26 Pages

2 March 2025

Currently, some platform-based enterprises are selling users’ private information to capture high revenue, which poses a great threat to users’ privacy and security and also poses a challenge to the work of regulators. This paper construc...

  • Article
  • Open Access
1 Citations
7,823 Views
58 Pages

Hybrid-Blockchain-Based Electronic Voting Machine System Embedded with Deepface, Sharding, and Post-Quantum Techniques

  • Sohel Ahmed Joni,
  • Rabiul Rahat,
  • Nishat Tasnin,
  • Partho Ghose,
  • Md. Ashraf Uddin and
  • John Ayoade

30 September 2024

The integrity of democratic processes relies on secure and reliable election systems, yet achieving this reliability is challenging. This paper introduces the Post-Quantum Secured Multiparty Computed Hierarchical Authoritative Consensus Blockchain (P...

  • Article
  • Open Access
4 Citations
3,207 Views
25 Pages

Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption

  • Haihe Ba,
  • Huaizhe Zhou,
  • Songzhu Mei,
  • Huidong Qiao,
  • Tie Hong,
  • Zhiying Wang and
  • Jiangchun Ren

21 September 2018

Cloud computing emerges as a change in the business paradigm that offers pay-as-you-go computing capability and brings enormous benefits, but there are numerous organizations showing hesitation for the adoption of cloud computing due to security conc...

  • Article
  • Open Access
1 Citations
1,437 Views
37 Pages

21 August 2025

Software-Defined Wide-Area Networks (SD-WAN) efficiently manage and route traffic across multiple WAN connections, enhancing the reliability of modern enterprise networks. However, the performance of SD-WANs is largely affected due to malicious activ...

  • Article
  • Open Access
20 Citations
4,506 Views
23 Pages

Quantum Diffie–Hellman Extended to Dynamic Quantum Group Key Agreement for e-Healthcare Multi-Agent Systems in Smart Cities

  • Vankamamidi S. Naresh,
  • Moustafa M. Nasralla,
  • Sivaranjani Reddi and
  • Iván García-Magariño

15 July 2020

Multi-Agent Systems can support e-Healthcare applications for improving quality of life of citizens. In this direction, we propose a healthcare system architecture named smart healthcare city. First, we divide a given city into various zones and then...

  • Article
  • Open Access
2 Citations
2,657 Views
16 Pages

A Visual Analysis Method for Predicting Material Properties Based on Uncertainty

  • Qikai Chu,
  • Lingli Zhang,
  • Zhouqiao He,
  • Yadong Wu and
  • Weihan Zhang

8 April 2023

The traditional way of studying fluorinated materials by adjusting parameters throughout multiple trials can no longer meet the needs of the processing and analysis of multi-source, heterogeneous, and numerous complex data. Due to the high confidenti...

  • Article
  • Open Access
1 Citations
970 Views
20 Pages

14 May 2025

Given that traditional grid energy storage planning neglects the impact of power supply demand on the effectiveness of storage deployment, the resulting system suffers from limited operational economic performance and restricted renewable energy inte...

  • Feature Paper
  • Article
  • Open Access
6 Citations
4,498 Views
36 Pages

Utilisation of Embodied Agents in the Design of Smart Human–Computer Interfaces—A Case Study in Cyberspace Event Visualisation Control

  • Wojciech Szynkiewicz,
  • Włodzimierz Kasprzak,
  • Cezary Zieliński,
  • Wojciech Dudek,
  • Maciej Stefańczyk,
  • Artur Wilkowski and
  • Maksym Figat

The goal of the research reported here was to investigate whether the design methodology utilising embodied agents can be applied to produce a multi-modal human–computer interface for cyberspace events visualisation control. This methodology re...

of 2