- document
-
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...conference paper 2022
- document
-
Chao, Q. (author), Yu, J (author), Dai, C. (author), Xu, T (author), Zhang, L. (author), Wang, C.C. (author), Jin, X. (author)We present a general solution for steering microrobotic<br/>swarm by dynamic actuating fields. In our approach, the<br/>motion of micro-robots is controlled by changing the actuating<br/>direction of a field applied to them. The time-series sequence<br/>of actuating field’s directions can be computed automatically.<br/>Given a target position in...conference paper 2016