LIP‐PA: A Logistics Information Privacy Protection Scheme with Position and Attribute‐Based Access Control on Mobile Devices
Q Gao, J Zhang, J Ma, C Yang, J Guo… - … and Mobile Computing, 2018 - Wiley Online Library
With the fast development of Logistics Internet of Things and smart devices, the security of
express information processed by mobile devices in Logistics Internet of Things has …
express information processed by mobile devices in Logistics Internet of Things has …
Telemetry data sharing based on Attribute-Based Encryption schemes for cloud-based Drone Management system
A Silonosov, L Henesey - … of the 19th International Conference on …, 2024 - dl.acm.org
The research presented in the paper evaluates practices of Attribute-Based Encryption,
leading to a proposed end-to-end encryption strategy for a cloud-based drone management …
leading to a proposed end-to-end encryption strategy for a cloud-based drone management …
TPLI: A traceable privacy-preserving logistics information scheme via blockchain
X Lin, P Jing, C Yu, X Feng - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The logistics information management system has been widely used, due to its high internal
operation efficiency, the visualization of package transportation, and the real-time sharing of …
operation efficiency, the visualization of package transportation, and the real-time sharing of …
TBAC: A Fine-Grained Topic-Based Access Control Model for Text Data
K Ma, G Yang - IEEE Transactions on Services Computing, 2022 - ieeexplore.ieee.org
Insufficient authorization and overauthorization are two main problems to be solved in
access control systems. If the authorization is too strict, users might not be able to access …
access control systems. If the authorization is too strict, users might not be able to access …
Cloud based privacy preserving collaborative business process management
B Schwarzbach, B Franczyk, L Petrich… - … on Computer and …, 2016 - ieeexplore.ieee.org
Through the outstanding efficiency and the general success of cloud computing, cloud-
innovations have become an everyday part of the industry. Almost every company has …
innovations have become an everyday part of the industry. Almost every company has …
A Blockchain-Based Privacy Protection Application for Logistics Big Data
H Duan, J Yang, H Yang - … of Cases on Information Technology (JCIT …, 2022 - igi-global.com
Logistics business is generally managed by logistics orders in plain text, and there is a risk
of disclosure of customer privacy information in every business link. In order to solve the …
of disclosure of customer privacy information in every business link. In order to solve the …
Housing demand estimation based on express delivery data
Housing demand estimation is an important topic in the field of economic research. It is
beneficial and helpful for various applications including real estate market regulation and …
beneficial and helpful for various applications including real estate market regulation and …
GhostBuy: An All-Steps Anonymous Purchase Platform (ASAPP) based on Separation of Data
F Willems, C Adams - … on Privacy, Security and Trust (PST), 2023 - ieeexplore.ieee.org
In recent years–and especially since the beginning of the COVID-19 pandemic–online
shopping has become a part of everyday life for many people. Yet, in contrast to buying at a …
shopping has become a part of everyday life for many people. Yet, in contrast to buying at a …
A multisecret value access control framework for airliner in multinational air traffic management
When been threatened by hijacking or suicide-bypilots, the airliner may either crash itself or
be shot down due to the potential of the suicide attack. There exist some solutions that allow …
be shot down due to the potential of the suicide attack. There exist some solutions that allow …
Crypto-agility performance analysis for AIS data sharing confidentiality based on attribute-based encryption
A Silonosov, L Henesey - … (CCSIT 2024), Copenhagen 21-22, 2024, 2024 - diva-portal.org
The research presented in the paper evaluates practices of Attribute-Based Encryption as a
key encapsulation mechanism and proposes end-to-end encryption architecture for a …
key encapsulation mechanism and proposes end-to-end encryption architecture for a …