Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 3 de 3
Filter
Add more filters










Database
Language
Publication year range
1.
Math Biosci Eng ; 19(11): 11034-11046, 2022 Aug 02.
Article in English | MEDLINE | ID: mdl-36124579

ABSTRACT

Internet of things (IoT) is a technology that can collect the data sensed by the devices for the further real-time services. Using the technique of cloud computing to assist IoT devices in data storing can eliminate the disadvantage of the constrained local storage and computing capability. However, the complex network environment makes cloud servers vulnerable to attacks, and adversaries pretend to be legal IoT clients trying to access the cloud server. Hence, it is necessary to provide a mechanism of mutual authentication for the cloud system to enhance the storage security. In this paper, a secure mutual authentication is proposed for cloud-assisted IoT. Note that the technique of chameleon hash signature is used to construct the authentication. Moreover, the proposed scheme can provide storage checking with the assist of a fully-trusted entity, which highly improves the checking fairness and efficiency. Security analysis proves that the proposed scheme in this paper is correct. Performance analysis demonstrates that the proposed scheme can be performed with high efficiency.

2.
Appl Opt ; 60(11): 2990-2997, 2021 Apr 10.
Article in English | MEDLINE | ID: mdl-33983192

ABSTRACT

It is important to improve the registration precision and speed in the process of registration. In order to solve this problem, we proposed a robust point cloud registration method based on deep learning, called PDC-Net, using a principal component analysis based adjustment network that quickly adjusts the initial position between two slices of the point cloud, then using an iterative neural network based on the inverse compositional algorithm to complete the final registration transformation. We compare it on the ModelNet40 dataset with iterative closest point, which is the traditional point cloud registration method, and the learning-based methods including PointNet-LK and deep closest point. The experimental results show that the registration error is not worse with the increase of the initial phase between point clouds, avoiding the algorithm falling into the local optimal solution and enhancing the robustness of registration.

3.
Sensors (Basel) ; 19(1)2019 Jan 02.
Article in English | MEDLINE | ID: mdl-30609740

ABSTRACT

Nowadays, two-factor data security protection has become a research hotspot in smart ocean management. With the increasing popularity of smart ocean management, how to achieve the two-factor protection of public data resources in smart ocean management is a serious problem to be tackled. Furthermore, how to achieve both security and revocation is also a challenge for two-factor protection. In this paper, we propose a two-factor-based protection scheme with factor revocation in smart ocean management. The proposed scheme allows data owners (DOs) to send encrypted messages to users through a shipboard server (SS). The DOs are required to formulate access policy and perform attribute-based encryption on messages. In order to decrypt, the users need to possess two factors. The first factor is the user's secret key. The second factor is security equipment, which is a sensor card in smart ocean system. The ciphertext can be decrypted if and only if the user gathers the key and the security equipment at the same time. What is more, once the security equipment is lost, the equipment can be revoked and a new one is redistributed to the users. The theoretical analysis and experiment results indeed indicate the security, efficiency, and practicality of our scheme.

SELECTION OF CITATIONS
SEARCH DETAIL
...