RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        A Decentralized and Non-reversible Traceability System for Storing Commodity Data

        ( Xiaojian He ),( Ximeng Chen ),( Kangzi Li ) 한국인터넷정보학회 2019 KSII Transactions on Internet and Information Syst Vol.13 No.2

        In the field of traceability systems, researchers focus on applications in the agricultural food traceability and scanning commodities. The purposes of this paper, however, is to propose an efficient and reliable traceability system that can be applied to all kinds of commodities. Currently, most traceability systems store data in a central server, which is unreliable when the system is under attack or if the administrator tampers with the data for personal interests. Therefore, it is necessary to design a system that can eliminate these threats. In this paper, we propose a decentralized and non-reversible traceability system for storing commodity data. This system depends on blockchain technology, which organizes data in the form of chains without a central server. This chain-style storage mechanism can prevent malicious modifications. In addition, some strategies are adopted to reduce the storage pressure and response time when the system has stored all kinds of commodity data.

      • KCI등재

        A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

        ( Hanshu Hong ),( Zhixin Sun ),( Ximeng Liu ) 한국인터넷정보학회 2016 KSII Transactions on Internet and Information Syst Vol.10 No.5

        ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user`s private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

      • KCI등재

        Transcriptome-based Discovery of AP2/ERF tRanscription Factors and Expression Profiles Under Herbivore Stress Conditions in Bamboo (Bambusa emeiensis)

        Yuanqiu Li,Chaobing Luo,Ying Chen,Ximeng Xiao,Chun Fu,Yaojun Yang 한국식물학회 2019 Journal of Plant Biology Vol.62 No.4

        Bambusa emeiensis is one of the most economicallyimportant bamboos, yet the yield and quality of this bamboospecies continue to be challenged by insect herbivores. APETALA2/ethylene responsive factors (AP2/ERF) comprise alarge family of plant transcription factors regulating numerousbiological processes and playing critical roles in plantdefence responses. In the present study, 47 AP2/ERF genes wereidentified and classified in the B. emeiensis herbivore-inducedtranscriptome. Based on AP2 domain numbers, conservedamino-acid residues, motif analyses and phylogenetic trees andBeAP2/ERF proteins were grouped into four subfamilies,namely AP2, ERF, Dehydration-responsive-element-binding(DREB) and Soloist, and these subfamilies consisted of nine, 23,14 and 1 proteins, respectively. Amino-acid residue sequencesof the AP2 domain in B. emeiensis were conserved comparedwith those in Arabidopsis thaliana. Expression analyses revealedthat the treatment (herbivore damage) and control groupsexhibited different expression patterns, and majority of BeERF/DREB genes were significantly and differentially expressed inthe transcriptome, as verified using quantitative real-time PCR(qPCR). Finally, eight genes were selected for further PCRanalyses of tissue-specific expression, of which the four tissuesexhibited different expression patterns. Our data indicated thatthe genes encoding the ERF/DREB subfamily of B. emeiensisplay critical roles in its response to herbivores.

      • KCI등재

        PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

        ( Jinbo Xiong ),( Zhiqiang Yao ),( Jianfeng Ma ),( Ximeng Liu ),( Qi Li ),( Jun Ma ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.1

        Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant`s identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant`s identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

      • KCI등재

        Provably secure attribute based signcryption with delegated computation and efficient key updating

        ( Hanshu Hong ),( Yunhao Xia ),( Zhixin Sun ),( Ximeng Liu ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.5

        Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user`s private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What`s more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client`s side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

      • KCI등재

        Dynamic Multi-peak MPPT for Photovoltaic Power Generation Under Local Shadows Based on Improved Mayfly Optimization

        Yi Lingzhi,Shi Hao,Liu Jiangyong,Zhou Dongfang,Liu Ximeng,Zhu Jiang 대한전기학회 2022 Journal of Electrical Engineering & Technology Vol.17 No.1

        The P-U curves of PV array panels under partial shading shows multi-peaked characteristics, therefore, conventional Maximum Power Point Tracking (MPPT) methods may fail or not be accurate enough. In this paper, a Chaos Mayfl y Optimization with Lévy Flight and Adaptive Algorithm (CMOFA) is proposed to track the maximum power points of PV arrays under partial shading. Firstly, sin chaos is used to initialize the population, then adaptive adjustment of inertia weights is introduced and the learning factor is changed to enhance the local search ability of the algorithm. Later in the operation of the algorithm, when the search falls into the local optimum, Lévy fl ight with induced variable step length is used to make the algorithm jump out of the local optimum and improve the local optimum avoidance ability of the mayfl y algorithm. The simulation results show that CMOFA is not only able to avoid local shading and dynamic shading changes, but also has a signifi cant improvement in convergence speed and search accuracy compared with conventional intelligent algorithms.

      • KCI등재

        Invariant-Feature Based Object Tracking Using Discrete Dynamic Swarm Optimization

        강규창,배창석,문진영,박종열,Yuk Ying Chung,Feng Sha,Ximeng Zhao 한국전자통신연구원 2017 ETRI Journal Vol.39 No.2

        With the remarkable growth in rich media in recent years, people are increasingly exposed to visual information from the environment. Visual information continues to play a vital role in rich media because people’s real interests lie in dynamic information. This paper proposes a novel discrete dynamic swarm optimization (DDSO) algorithm for video object tracking using invariant features. The proposed approach is designed to track objects more robustly than other traditional algorithms in terms of illumination changes, background noise, and occlusions. DDSO is integrated with a matching procedure to eliminate inappropriate feature points geographically. The proposed novel fitness function can aid in excluding the influence of some noisy mismatched feature points. The test results showed that our approach can overcome changes in illumination, background noise, and occlusions more effectively than other traditional methods, including color-tracking and invariant feature-tracking methods.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼