• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:蔡永泉

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Language

Submit

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 14 >
A secure and size efficient approach to enhance the performance of text steganographic algorithm EI
会议论文 | 2019 , 402-407 | 11th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2019
Abstract&Keyword Cite

Abstract :

Steganography is a fundamental and foremost approach that is used to ensure confidentiality of secret data. It is an art, which ensures invisible communication by concealing secret information in cover media through scientific techniques. The text steganography has a great challenge of security, robustness and size of stego text. In current studies, an improved, lightweight, secure, robust and size efficient technique is proposed for text steganography that also enhances the performance of existing approaches. To achieve the objectives, algorithm applies a conditional bit-complement function on binary value of confidential information. Moreover, start and end bits are also inserted during embedding secret information in cover text and confirms the integrity and confidentiality of secret data. Experimental results revealed that projected approach is more robust and secure without any stego key overhead. Furthermore, it has successfully achieved a size efficient stego text. Therefore, the secret information exhibits harder to track © 2019 IEEE.

Keyword :

Steganography Steganography Cryptography Cryptography

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Azeem, Muhammad , Cai, Yongquan , Rana, Khurram Gulzar et al. A secure and size efficient approach to enhance the performance of text steganographic algorithm [C] . 2019 : 402-407 .
MLA Azeem, Muhammad et al. "A secure and size efficient approach to enhance the performance of text steganographic algorithm" . (2019) : 402-407 .
APA Azeem, Muhammad , Cai, Yongquan , Rana, Khurram Gulzar , Shaukat, Zeeshan , Ditta, Allah . A secure and size efficient approach to enhance the performance of text steganographic algorithm . (2019) : 402-407 .
Export to NoteExpress RIS BibTex
ID-based dynamic replicated data auditing for the cloud SCIE
期刊论文 | 2019 , 31 (11) | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
WoS CC Cited Count: 4
Abstract&Keyword Cite

Abstract :

As an essential component of cloud computing, cloud storage provides flexible data storage services for individuals and organizations. By storing multiple replicas of data in servers, cloud storage providers (CSPs) can improve availability and stability of the cloud storage service. To ensure that all data replicas of a cloud user are intact and completely stored in the CSP, many multi-replica cloud auditing schemes have been proposed. However, such schemes are predominantly based on the public key infrastructure (PKI), which incurs complex certificate management. In addition, existing schemes do not consider support for sector-level dynamic auditing. In this paper, we propose a fine-grained dynamic multi-replica data auditing scheme that has the following features: (1) it uses ID-based cryptography to eliminate the cost of certificate management, (2) it supports efficient sector-level dynamic operations on cloud user data, and (3) it optimizes the challenge algorithm to reduce the computational cost of the third party auditor (TPA). We show that the proposed scheme is provably secure based on a random oracle model. The performance analysis and experiments show the efficiency of the proposed scheme.

Keyword :

dynamic operation dynamic operation ID-based cryptography ID-based cryptography replicated data auditing replicated data auditing data integrity data integrity

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yu, Haiyang , Cai, Yongquan , Sinnott, Richard O. et al. ID-based dynamic replicated data auditing for the cloud [J]. | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2019 , 31 (11) .
MLA Yu, Haiyang et al. "ID-based dynamic replicated data auditing for the cloud" . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 31 . 11 (2019) .
APA Yu, Haiyang , Cai, Yongquan , Sinnott, Richard O. , Yang, Zhen . ID-based dynamic replicated data auditing for the cloud . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2019 , 31 (11) .
Export to NoteExpress RIS BibTex
An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems EI
期刊论文 | 2019 , 16 (1) , 41-49 | International Journal of Wireless and Mobile Computing
Abstract&Keyword Cite

Abstract :

The CP-ABE-based access control scheme, which can better realise the access control of many-to-multi-ciphertext shared in the cloud storage architecture, is still facing the problems that the system cost is too large, and the policy attribute revocation or restore is not flexible. This paper proposes an efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage system. The fine-grained access control can be achieved by re-encryption mechanism which takes the minimum shared re-encryption key for policy attribute set. And then the access structure tree is expanded by creating a corresponding virtual attribute for each leaf node attribute. The analysis results of the scheme indicate that the efficient and flexibility of the attribute change is not only improved, but also the system cost is reduced. Copyright © 2019 Inderscience Enterprises Ltd.

Keyword :

Access control Access control Cost benefit analysis Cost benefit analysis Cryptography Cryptography

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Ye, Tao , Cai, Yongquan , Zhao, Xu et al. An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems [J]. | International Journal of Wireless and Mobile Computing , 2019 , 16 (1) : 41-49 .
MLA Ye, Tao et al. "An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems" . | International Journal of Wireless and Mobile Computing 16 . 1 (2019) : 41-49 .
APA Ye, Tao , Cai, Yongquan , Zhao, Xu , Yang, Yongli , Wang, Wei , Zhu, Yi . An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems . | International Journal of Wireless and Mobile Computing , 2019 , 16 (1) , 41-49 .
Export to NoteExpress RIS BibTex
A Novel Quantum Image Compression Method Based on JPEG SCIE
期刊论文 | 2018 , 57 (3) , 611-636 | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS
WoS CC Cited Count: 8
Abstract&Keyword Cite

Abstract :

Quantum image processing has been a hot topic. The first step of it is to store an image into qubits, which is called quantum image preparation. Different quantum image representations may have different preparation methods. In this paper, we use GQIR (the generalized quantum image representation) to represent an image, and try to decrease the operations used in preparation, which is also known as quantum image compression. Our compression scheme is based on JPEG (named from its inventor: the Joint Photographic Experts Group) - the most widely used method for still image compression in classical computers. We input the quantized JPEG coefficients into qubits and then convert them into pixel values. Theoretical analysis and experimental results show that the compression ratio of our scheme is obviously higher than that of the previous compression method.

Keyword :

Quantum image processing Quantum image processing Quantum image compression Quantum image compression Quantum computation Quantum computation Quantum image preparation Quantum image preparation JPEG compression JPEG compression

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Jiang, Nan , Lu, Xiaowei , Hu, Hao et al. A Novel Quantum Image Compression Method Based on JPEG [J]. | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS , 2018 , 57 (3) : 611-636 .
MLA Jiang, Nan et al. "A Novel Quantum Image Compression Method Based on JPEG" . | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS 57 . 3 (2018) : 611-636 .
APA Jiang, Nan , Lu, Xiaowei , Hu, Hao , Dang, Yijie , Cai, Yongquan . A Novel Quantum Image Compression Method Based on JPEG . | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS , 2018 , 57 (3) , 611-636 .
Export to NoteExpress RIS BibTex
SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS
期刊论文 | 2018 , 14 (6) , 2221-2243 | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL
Abstract&Keyword Cite

Abstract :

A severe contest for seamless roaming between inter-domain Wireless Fidelity technologies is to build a trust model in a milieu of several WLAN service providers with varying charging or billing options and authentication mechanisms. This study implements a comprehensive single sign-on prototype for the unification of various WLAN service providers. Users choose the suitable single sign-on verification scheme from the authentication abilities existing on the WLAN service providers that prevent the exposure of their information from illegitimate users while roaming. A composite layer 2 and web-based authentication method intended to ensure secure transmission of cryptographic keys while maintaining the prevailing WLAN charging options. The study deployed RADIUS and liberty based protocols to control unauthorized access to the WLAN network resources. In this paper, RADIUS simulation performed shows how authentication, authorization and accounting standards can be used to allow only the legitimate client to access the network while averting unauthorized users. In addition, the performance of the confederated Wi-Fi networks was shown by performing an experiment for the negotiation based authentication protocol with policy engine and authentication framework via the web-based protocol. The proposed mechanism revealed low latencies results which are suitable to support seamless user experience.

Keyword :

Seamless user experience Seamless user experience Identity provider Identity provider Service provider Service provider Authentication delay Authentication delay Security association Security association Web authentication Web authentication Policy engine Policy engine

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Tsitaitse, Tahadray Jean , Cai, Yongquan , Suntu, Shaldon Leparan . SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS [J]. | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL , 2018 , 14 (6) : 2221-2243 .
MLA Tsitaitse, Tahadray Jean et al. "SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS" . | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 14 . 6 (2018) : 2221-2243 .
APA Tsitaitse, Tahadray Jean , Cai, Yongquan , Suntu, Shaldon Leparan . SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS . | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL , 2018 , 14 (6) , 2221-2243 .
Export to NoteExpress RIS BibTex
Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation EI
期刊论文 | 2018 , 14 (1) , 90-96 | International Journal of Wireless and Mobile Computing
Abstract&Keyword Cite

Abstract :

With the emergence of the cloud computing paradigm in scientific and business applications, computation outsourcing to the cloud has become a popular application in the age of cloud computing. However, this computing paradigm brings in some new security concerns and challenges, such as input/output privacy and result verifiability. In this paper we use similar transformation of matrix to design secure verifiable and practical outsourcing protocol for matrix multiplication calculation. Compared with those existing outsourcing protocols, our protocol has obvious improvement concerning both efficiency and security. In order to check the correctness of the result returned from the cloud, an efficient verification algorithm is employed. Computational complexity analysis shows that our protocol is highly efficient. © 2018 Inderscience Enterprises Ltd.

Keyword :

Verification Verification Cloud computing Cloud computing Outsourcing Outsourcing Linear transformations Linear transformations Matrix algebra Matrix algebra

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Kong, Shanshan , Cai, Yongquan , Xue, Fei et al. Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) : 90-96 .
MLA Kong, Shanshan et al. "Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation" . | International Journal of Wireless and Mobile Computing 14 . 1 (2018) : 90-96 .
APA Kong, Shanshan , Cai, Yongquan , Xue, Fei , Yu, Haiyang , Ditta, Allah . Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation . | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) , 90-96 .
Export to NoteExpress RIS BibTex
Research on parallelisation of collaborative filtering recommendation algorithm based on Spark EI
期刊论文 | 2018 , 14 (4) , 312-319 | International Journal of Wireless and Mobile Computing
Abstract&Keyword Cite

Abstract :

More and more people become conscious of the recommendation system to make good use of the data through their inherent advantages faced with the large amount of data on the Internet. The collaborative filtering recommendation algorithm cannot avoid the bottleneck of computing performance problems in the recommendation process. In this paper, we propose a parallel collaborative filtering recommendation algorithm RLPSO-KM-CF which is implemented based on Spark. Firstly, the RLPSO (reverse-learning and local-learning PSO) algorithm is used to find the optimal solution of particle swarm and output the optimised clustering centre. Then, the RLPSO-KM algorithm is used to cluster the user information. Finally, make effective recommendations to the target user by combining the traditional user-based collaborative filtering algorithm with the RLPSO-KM clustering algorithm. The experimental results show that the RLPSO-KM-CF algorithm has a significant improvement in the recommendation accuracy and has a higher speed-up and stability. Copyright © 2018 Inderscience Enterprises Ltd.

Keyword :

Particle swarm optimization (PSO) Particle swarm optimization (PSO) Electric sparks Electric sparks Collaborative filtering Collaborative filtering K-means clustering K-means clustering

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yang, Yongli , Ning, Zhenhu , Cai, Yongquan et al. Research on parallelisation of collaborative filtering recommendation algorithm based on Spark [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (4) : 312-319 .
MLA Yang, Yongli et al. "Research on parallelisation of collaborative filtering recommendation algorithm based on Spark" . | International Journal of Wireless and Mobile Computing 14 . 4 (2018) : 312-319 .
APA Yang, Yongli , Ning, Zhenhu , Cai, Yongquan , Liang, Peng , Liu, Haifeng . Research on parallelisation of collaborative filtering recommendation algorithm based on Spark . | International Journal of Wireless and Mobile Computing , 2018 , 14 (4) , 312-319 .
Export to NoteExpress RIS BibTex
A Survey on Quantum Image Processing SCIE
期刊论文 | 2018 , 27 (4) , 718-727 | CHINESE JOURNAL OF ELECTRONICS
WoS CC Cited Count: 12
Abstract&Keyword Cite

Abstract :

Quantum image processing is the intersection of quantum computation and image processing. Due to it is a newly emerging thing, researchers are facing not only great opportunities but also many challenges to develop more efficient and practicable services. We provide a comprehensive survey on quantum image processing to gather the current mainstream and discuss the advances made in the area, including quantum image representations, processing algorithms, and image measurement. Moreover, some open challenges and future directions are pointed out to attract continued research efforts.

Keyword :

Quantum information Quantum information Quantum computation Quantum computation Quantum image representation Quantum image representation Measurement Measurement Quantum image processing Quantum image processing Quantum image compression Quantum image compression

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Cai Yongquan , Lu Xiaowei , Jiang Nan . A Survey on Quantum Image Processing [J]. | CHINESE JOURNAL OF ELECTRONICS , 2018 , 27 (4) : 718-727 .
MLA Cai Yongquan et al. "A Survey on Quantum Image Processing" . | CHINESE JOURNAL OF ELECTRONICS 27 . 4 (2018) : 718-727 .
APA Cai Yongquan , Lu Xiaowei , Jiang Nan . A Survey on Quantum Image Processing . | CHINESE JOURNAL OF ELECTRONICS , 2018 , 27 (4) , 718-727 .
Export to NoteExpress RIS BibTex
Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach EI
期刊论文 | 2018 , 14 (1) , 16-24 | International Journal of Wireless and Mobile Computing
Abstract&Keyword Cite

Abstract :

Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV) routing protocol exhibits gutless defence against black hole attacks that disrupt its normal functionality and compromise data transmission. In current research, a novel solution AODV black hole detection and removal (AODV-BDR) is proposed. AODV-BDR detects and removes black hole attack by using neighbour-based authentication technique. According to suggested solution, every intermediate node that claims that it upholds a fresh route to destination sends its Next Hop Node (NHN) address to source in route reply packet. Source sends validation packet to NHN. On receiving validation packet, NHN generates validation reply having information about Previous Hop Node (PHN) and send to the source. On receiving validation reply, source declares malicious or normal behaviour of PHN. Results revealed that projected scheme detects malicious node with great accuracy. Moreover, AODV-BDR is very useful because it carries no overhead of encryption and hashing. © 2018 Inderscience Enterprises Ltd.

Keyword :

Authentication Authentication Stars Stars Network routing Network routing Gravitation Gravitation Cryptography Cryptography Routing protocols Routing protocols Ad hoc networks Ad hoc networks Network security Network security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Rana, Khurram Gulzar , Yongquan, Cai , Azeem, Muhammad et al. Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) : 16-24 .
MLA Rana, Khurram Gulzar et al. "Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach" . | International Journal of Wireless and Mobile Computing 14 . 1 (2018) : 16-24 .
APA Rana, Khurram Gulzar , Yongquan, Cai , Azeem, Muhammad , Ditta, Allah , Yu, Haiyang , Khuhro, Sijjad Ali . Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach . | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) , 16-24 .
Export to NoteExpress RIS BibTex
Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters EI
期刊论文 | 2018 , 10 (4) , 437-453 | International Journal of Information and Computer Security
Abstract&Keyword Cite

Abstract :

From centuries, information security has been an attractive topic for security officials, intruders, hackers and other communication sectors throughout the world. Cryptography and steganography are widely practiced for secure communication over the internet. In steganography, data hiding capacity has been a great challenge for the research community and security officials. In this research, a novel algorithm is elaborated to conceal secret data with higher cover text capacity by using three different unicode characters such as zero width joiner, zero width non-joiner and zero width character. English text is taken as a message carrier. Before embedding a secret message into cover text, one's complement is applied on binary value of specific characters in secret message. Furthermore, 'Steger' is developed for the practical implementation of designed algorithm. The results revealed that newly designed algorithm reported higher data hiding capacity with security and size efficiency. This is an astonishing increase in data hiding capacity of carrier text. The unicode approach was efficiently and effectively used to reduce the attention of intruders. © 2018 Inderscience Enterprises Ltd.

Keyword :

Steganography Steganography Personal computing Personal computing

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Azeem, Muhammad , Yongquan, Cai , Ditta, Allah et al. Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters [J]. | International Journal of Information and Computer Security , 2018 , 10 (4) : 437-453 .
MLA Azeem, Muhammad et al. "Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters" . | International Journal of Information and Computer Security 10 . 4 (2018) : 437-453 .
APA Azeem, Muhammad , Yongquan, Cai , Ditta, Allah , Rana, Khurram Gulzar , Rajpoot, Faheem Akhtar . Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters . | International Journal of Information and Computer Security , 2018 , 10 (4) , 437-453 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 14 >

Export

Results:

Selected

to

Format:
Online/Total:2323/2724180
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.