Searched for: +
(1 - 3 of 3)
document
Wang, Lili (author), Lin, Ye (author), Yao, Ting (author), Xiong, Hu (author), Liang, K. (author)
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving the unbounded feature. To address this problem, we proposed a fast and secure unbounded cross-domain proxy re-encryption scheme, named FABRIC, which enables the delegator to authorize...
journal article 2023
document
Chiasson, David (author), Lin, Yuan (author), Kok, M. (author), Shull, Peter (author)
Hyperbolic localization measures the time difference of arrivals (TDOAs) of signals to determine the location of a wireless source or receiver. Traditional methods depend on precise clock synchronization between nodes so that time measurements from independent devices can be meaningfully compared. Imperfect synchronization is often the dominant...
journal article 2023
document
Xu, Weitao (author), Xue, Wanli (author), Lin, Qi (author), Lan, G. (author), Feng, Xingyu (author), Wei, Bo (author), Luo, Chengwen (author), Li, Wei (author), Zomaya, Albert Y. (author)
Smart space has emerged as a new paradigm that combines sensing, communication, and artificial intelligence technologies to offer various customized services. A fundamental requirement of these services is person identification. Although a variety of person-identification approaches has been proposed, they suffer from several limitations in...
journal article 2022