• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:蔡永泉

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Language

Submit

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 14 >
A secure and size efficient approach to enhance the performance of text steganographic algorithm EI
会议论文 | 2019 , 402-407 | 11th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2019
Abstract&Keyword Cite

Abstract :

Steganography is a fundamental and foremost approach that is used to ensure confidentiality of secret data. It is an art, which ensures invisible communication by concealing secret information in cover media through scientific techniques. The text steganography has a great challenge of security, robustness and size of stego text. In current studies, an improved, lightweight, secure, robust and size efficient technique is proposed for text steganography that also enhances the performance of existing approaches. To achieve the objectives, algorithm applies a conditional bit-complement function on binary value of confidential information. Moreover, start and end bits are also inserted during embedding secret information in cover text and confirms the integrity and confidentiality of secret data. Experimental results revealed that projected approach is more robust and secure without any stego key overhead. Furthermore, it has successfully achieved a size efficient stego text. Therefore, the secret information exhibits harder to track © 2019 IEEE.

Keyword :

Steganography Steganography Cryptography Cryptography

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Azeem, Muhammad , Cai, Yongquan , Rana, Khurram Gulzar et al. A secure and size efficient approach to enhance the performance of text steganographic algorithm [C] . 2019 : 402-407 .
MLA Azeem, Muhammad et al. "A secure and size efficient approach to enhance the performance of text steganographic algorithm" . (2019) : 402-407 .
APA Azeem, Muhammad , Cai, Yongquan , Rana, Khurram Gulzar , Shaukat, Zeeshan , Ditta, Allah . A secure and size efficient approach to enhance the performance of text steganographic algorithm . (2019) : 402-407 .
Export to NoteExpress RIS BibTex
An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems EI
期刊论文 | 2019 , 16 (1) , 41-49 | International Journal of Wireless and Mobile Computing
Abstract&Keyword Cite

Abstract :

The CP-ABE-based access control scheme, which can better realise the access control of many-to-multi-ciphertext shared in the cloud storage architecture, is still facing the problems that the system cost is too large, and the policy attribute revocation or restore is not flexible. This paper proposes an efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage system. The fine-grained access control can be achieved by re-encryption mechanism which takes the minimum shared re-encryption key for policy attribute set. And then the access structure tree is expanded by creating a corresponding virtual attribute for each leaf node attribute. The analysis results of the scheme indicate that the efficient and flexibility of the attribute change is not only improved, but also the system cost is reduced. Copyright © 2019 Inderscience Enterprises Ltd.

Keyword :

Access control Access control Cost benefit analysis Cost benefit analysis Cryptography Cryptography

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Ye, Tao , Cai, Yongquan , Zhao, Xu et al. An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems [J]. | International Journal of Wireless and Mobile Computing , 2019 , 16 (1) : 41-49 .
MLA Ye, Tao et al. "An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems" . | International Journal of Wireless and Mobile Computing 16 . 1 (2019) : 41-49 .
APA Ye, Tao , Cai, Yongquan , Zhao, Xu , Yang, Yongli , Wang, Wei , Zhu, Yi . An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems . | International Journal of Wireless and Mobile Computing , 2019 , 16 (1) , 41-49 .
Export to NoteExpress RIS BibTex
ID-based dynamic replicated data auditing for the cloud SCIE
期刊论文 | 2019 , 31 (11) | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
WoS CC Cited Count: 4
Abstract&Keyword Cite

Abstract :

As an essential component of cloud computing, cloud storage provides flexible data storage services for individuals and organizations. By storing multiple replicas of data in servers, cloud storage providers (CSPs) can improve availability and stability of the cloud storage service. To ensure that all data replicas of a cloud user are intact and completely stored in the CSP, many multi-replica cloud auditing schemes have been proposed. However, such schemes are predominantly based on the public key infrastructure (PKI), which incurs complex certificate management. In addition, existing schemes do not consider support for sector-level dynamic auditing. In this paper, we propose a fine-grained dynamic multi-replica data auditing scheme that has the following features: (1) it uses ID-based cryptography to eliminate the cost of certificate management, (2) it supports efficient sector-level dynamic operations on cloud user data, and (3) it optimizes the challenge algorithm to reduce the computational cost of the third party auditor (TPA). We show that the proposed scheme is provably secure based on a random oracle model. The performance analysis and experiments show the efficiency of the proposed scheme.

Keyword :

dynamic operation dynamic operation ID-based cryptography ID-based cryptography replicated data auditing replicated data auditing data integrity data integrity

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yu, Haiyang , Cai, Yongquan , Sinnott, Richard O. et al. ID-based dynamic replicated data auditing for the cloud [J]. | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2019 , 31 (11) .
MLA Yu, Haiyang et al. "ID-based dynamic replicated data auditing for the cloud" . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 31 . 11 (2019) .
APA Yu, Haiyang , Cai, Yongquan , Sinnott, Richard O. , Yang, Zhen . ID-based dynamic replicated data auditing for the cloud . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2019 , 31 (11) .
Export to NoteExpress RIS BibTex
Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach EI
期刊论文 | 2018 , 14 (1) , 16-24 | International Journal of Wireless and Mobile Computing
Abstract&Keyword Cite

Abstract :

Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV) routing protocol exhibits gutless defence against black hole attacks that disrupt its normal functionality and compromise data transmission. In current research, a novel solution AODV black hole detection and removal (AODV-BDR) is proposed. AODV-BDR detects and removes black hole attack by using neighbour-based authentication technique. According to suggested solution, every intermediate node that claims that it upholds a fresh route to destination sends its Next Hop Node (NHN) address to source in route reply packet. Source sends validation packet to NHN. On receiving validation packet, NHN generates validation reply having information about Previous Hop Node (PHN) and send to the source. On receiving validation reply, source declares malicious or normal behaviour of PHN. Results revealed that projected scheme detects malicious node with great accuracy. Moreover, AODV-BDR is very useful because it carries no overhead of encryption and hashing. © 2018 Inderscience Enterprises Ltd.

Keyword :

Authentication Authentication Stars Stars Network routing Network routing Gravitation Gravitation Cryptography Cryptography Routing protocols Routing protocols Ad hoc networks Ad hoc networks Network security Network security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Rana, Khurram Gulzar , Yongquan, Cai , Azeem, Muhammad et al. Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) : 16-24 .
MLA Rana, Khurram Gulzar et al. "Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach" . | International Journal of Wireless and Mobile Computing 14 . 1 (2018) : 16-24 .
APA Rana, Khurram Gulzar , Yongquan, Cai , Azeem, Muhammad , Ditta, Allah , Yu, Haiyang , Khuhro, Sijjad Ali . Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach . | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) , 16-24 .
Export to NoteExpress RIS BibTex
SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS
期刊论文 | 2018 , 14 (6) , 2221-2243 | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL
Abstract&Keyword Cite

Abstract :

A severe contest for seamless roaming between inter-domain Wireless Fidelity technologies is to build a trust model in a milieu of several WLAN service providers with varying charging or billing options and authentication mechanisms. This study implements a comprehensive single sign-on prototype for the unification of various WLAN service providers. Users choose the suitable single sign-on verification scheme from the authentication abilities existing on the WLAN service providers that prevent the exposure of their information from illegitimate users while roaming. A composite layer 2 and web-based authentication method intended to ensure secure transmission of cryptographic keys while maintaining the prevailing WLAN charging options. The study deployed RADIUS and liberty based protocols to control unauthorized access to the WLAN network resources. In this paper, RADIUS simulation performed shows how authentication, authorization and accounting standards can be used to allow only the legitimate client to access the network while averting unauthorized users. In addition, the performance of the confederated Wi-Fi networks was shown by performing an experiment for the negotiation based authentication protocol with policy engine and authentication framework via the web-based protocol. The proposed mechanism revealed low latencies results which are suitable to support seamless user experience.

Keyword :

Seamless user experience Seamless user experience Identity provider Identity provider Service provider Service provider Authentication delay Authentication delay Security association Security association Web authentication Web authentication Policy engine Policy engine

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Tsitaitse, Tahadray Jean , Cai, Yongquan , Suntu, Shaldon Leparan . SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS [J]. | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL , 2018 , 14 (6) : 2221-2243 .
MLA Tsitaitse, Tahadray Jean et al. "SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS" . | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 14 . 6 (2018) : 2221-2243 .
APA Tsitaitse, Tahadray Jean , Cai, Yongquan , Suntu, Shaldon Leparan . SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS . | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL , 2018 , 14 (6) , 2221-2243 .
Export to NoteExpress RIS BibTex
Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters EI
期刊论文 | 2018 , 10 (4) , 437-453 | International Journal of Information and Computer Security
Abstract&Keyword Cite

Abstract :

From centuries, information security has been an attractive topic for security officials, intruders, hackers and other communication sectors throughout the world. Cryptography and steganography are widely practiced for secure communication over the internet. In steganography, data hiding capacity has been a great challenge for the research community and security officials. In this research, a novel algorithm is elaborated to conceal secret data with higher cover text capacity by using three different unicode characters such as zero width joiner, zero width non-joiner and zero width character. English text is taken as a message carrier. Before embedding a secret message into cover text, one's complement is applied on binary value of specific characters in secret message. Furthermore, 'Steger' is developed for the practical implementation of designed algorithm. The results revealed that newly designed algorithm reported higher data hiding capacity with security and size efficiency. This is an astonishing increase in data hiding capacity of carrier text. The unicode approach was efficiently and effectively used to reduce the attention of intruders. © 2018 Inderscience Enterprises Ltd.

Keyword :

Steganography Steganography Personal computing Personal computing

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Azeem, Muhammad , Yongquan, Cai , Ditta, Allah et al. Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters [J]. | International Journal of Information and Computer Security , 2018 , 10 (4) : 437-453 .
MLA Azeem, Muhammad et al. "Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters" . | International Journal of Information and Computer Security 10 . 4 (2018) : 437-453 .
APA Azeem, Muhammad , Yongquan, Cai , Ditta, Allah , Rana, Khurram Gulzar , Rajpoot, Faheem Akhtar . Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters . | International Journal of Information and Computer Security , 2018 , 10 (4) , 437-453 .
Export to NoteExpress RIS BibTex
Information hiding: Arabic text steganography by using Unicode characters to hide secret data EI
期刊论文 | 2018 , 10 (1) , 61-78 | International Journal of Electronic Security and Digital Forensics
Abstract&Keyword Cite

Abstract :

In recent years, information security has become a very important topic for researchers as well as military and government officials. For secure communication, it is necessary to develop novel ways to hide information. For this purpose, steganography is commonly used to send secret information to its destination using different techniques. In this article, our main focus is on text-based steganography. Hidden information in text files is difficult to discover as text data has low redundancy in comparison to other mediums of steganography. Hence, we use Arabic text to hide secret information using a combination of Unicode character's zero-width-character and zero-width-joiner in our proposed algorithm. The experimental results show hidden data capacity per word is significantly increased in comparison to the recently proposed algorithms. The major advantage of our proposed algorithm over previous research is the high visual similarity in both cover and stego-text that can reduce the attention of intruders. © 2018 Inderscience Enterprises Ltd.

Keyword :

Information use Information use Steganography Steganography Security of data Security of data

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Ditta, Allah , Yongquan, Cai , Azeem, Muhammad et al. Information hiding: Arabic text steganography by using Unicode characters to hide secret data [J]. | International Journal of Electronic Security and Digital Forensics , 2018 , 10 (1) : 61-78 .
MLA Ditta, Allah et al. "Information hiding: Arabic text steganography by using Unicode characters to hide secret data" . | International Journal of Electronic Security and Digital Forensics 10 . 1 (2018) : 61-78 .
APA Ditta, Allah , Yongquan, Cai , Azeem, Muhammad , Rana, Khurram Gulzar , Yu, Haiyang , Memon, Muhammad Qasim . Information hiding: Arabic text steganography by using Unicode characters to hide secret data . | International Journal of Electronic Security and Digital Forensics , 2018 , 10 (1) , 61-78 .
Export to NoteExpress RIS BibTex
Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid SCIE
期刊论文 | 2018 , 101 (3) , 1749-1763 | WIRELESS PERSONAL COMMUNICATIONS
WoS CC Cited Count: 8
Abstract&Keyword Cite

Abstract :

Smart grid has a great advantage over the traditional power grid and it is a critical condition in people's daily life. The security of data communication in smart grid is important and needs to be efficiently guaranteed. The supervisory control and data acquisition (SCADA) systems is in charge of supervising the sensitive process. In SCADA systems, the secure communication between control center and remote terminal units can be achieved by the key distribution mechanism. However, the remote terminal units are resource-constrained and sometimes are not available so that they cannot receive the session key updating broadcast. Self-healing is an efficient mechanism to calculate missing session keys by using later broadcast messages. In this paper, we propose an efficient self-healing group key distribution scheme for SCADA systems. The security analysis illustrates that our scheme satisfy the basic security properties defined in security model. According to the performance evaluation from storage and communication cost viewpoints, the proposed scheme is efficient.

Keyword :

Key distribution Key distribution Self-healing Self-healing SCADA systems SCADA systems Security Security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Tsitaitse, Tahadray Jean , Cai, Yongquan , Ditta, Allah . Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid [J]. | WIRELESS PERSONAL COMMUNICATIONS , 2018 , 101 (3) : 1749-1763 .
MLA Tsitaitse, Tahadray Jean et al. "Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid" . | WIRELESS PERSONAL COMMUNICATIONS 101 . 3 (2018) : 1749-1763 .
APA Tsitaitse, Tahadray Jean , Cai, Yongquan , Ditta, Allah . Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid . | WIRELESS PERSONAL COMMUNICATIONS , 2018 , 101 (3) , 1749-1763 .
Export to NoteExpress RIS BibTex
Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation EI
期刊论文 | 2018 , 14 (1) , 90-96 | International Journal of Wireless and Mobile Computing
Abstract&Keyword Cite

Abstract :

With the emergence of the cloud computing paradigm in scientific and business applications, computation outsourcing to the cloud has become a popular application in the age of cloud computing. However, this computing paradigm brings in some new security concerns and challenges, such as input/output privacy and result verifiability. In this paper we use similar transformation of matrix to design secure verifiable and practical outsourcing protocol for matrix multiplication calculation. Compared with those existing outsourcing protocols, our protocol has obvious improvement concerning both efficiency and security. In order to check the correctness of the result returned from the cloud, an efficient verification algorithm is employed. Computational complexity analysis shows that our protocol is highly efficient. © 2018 Inderscience Enterprises Ltd.

Keyword :

Verification Verification Cloud computing Cloud computing Outsourcing Outsourcing Linear transformations Linear transformations Matrix algebra Matrix algebra

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Kong, Shanshan , Cai, Yongquan , Xue, Fei et al. Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) : 90-96 .
MLA Kong, Shanshan et al. "Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation" . | International Journal of Wireless and Mobile Computing 14 . 1 (2018) : 90-96 .
APA Kong, Shanshan , Cai, Yongquan , Xue, Fei , Yu, Haiyang , Ditta, Allah . Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation . | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) , 90-96 .
Export to NoteExpress RIS BibTex
A Novel Quantum Image Compression Method Based on JPEG SCIE
期刊论文 | 2018 , 57 (3) , 611-636 | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS
WoS CC Cited Count: 16
Abstract&Keyword Cite

Abstract :

Quantum image processing has been a hot topic. The first step of it is to store an image into qubits, which is called quantum image preparation. Different quantum image representations may have different preparation methods. In this paper, we use GQIR (the generalized quantum image representation) to represent an image, and try to decrease the operations used in preparation, which is also known as quantum image compression. Our compression scheme is based on JPEG (named from its inventor: the Joint Photographic Experts Group) - the most widely used method for still image compression in classical computers. We input the quantized JPEG coefficients into qubits and then convert them into pixel values. Theoretical analysis and experimental results show that the compression ratio of our scheme is obviously higher than that of the previous compression method.

Keyword :

Quantum image processing Quantum image processing Quantum image compression Quantum image compression Quantum computation Quantum computation Quantum image preparation Quantum image preparation JPEG compression JPEG compression

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Jiang, Nan , Lu, Xiaowei , Hu, Hao et al. A Novel Quantum Image Compression Method Based on JPEG [J]. | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS , 2018 , 57 (3) : 611-636 .
MLA Jiang, Nan et al. "A Novel Quantum Image Compression Method Based on JPEG" . | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS 57 . 3 (2018) : 611-636 .
APA Jiang, Nan , Lu, Xiaowei , Hu, Hao , Dang, Yijie , Cai, Yongquan . A Novel Quantum Image Compression Method Based on JPEG . | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS , 2018 , 57 (3) , 611-636 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 14 >

Export

Results:

Selected

to

Format:
Online/Total:379/6036601
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.