BSAS: a blockchain-based trustworthy and privacy-preserving speed advisory system

J Li, S Li, L Cheng, Q Liu, J Pei… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Consensus-based Speed Advisory System (CSAS) is used to recommend a consensus
speed to a group of vehicles for specific application purposes, such as minimizing emissions …

[КНИГА][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[КНИГА][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

[КНИГА][B] Information theory and network coding

RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …

Towards photography through realistic fog

G Satat, M Tancik, R Raskar - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Imaging through fog has important applications in industries such as self-driving cars,
augmented driving, airplanes, helicopters, drones and trains. Here we show that time …

Minimal vectors in linear codes

A Ashikhmin, A Barg - IEEE Transactions on Information Theory, 1998 - ieeexplore.ieee.org
Minimal vectors in linear codes arise in numerous applications, particularly, in constructing
decoding algorithms and studying linear secret sharing schemes. However, properties and …

[КНИГА][B] A first course in information theory

RW Yeung - 2012 - books.google.com
A First Course in Information Theory is an up-to-date introduction to information theory. In
addition to the classical topics discussed, it provides the first comprehensive treatment of the …

Scalable and privacy-preserving data sharing based on blockchain

BK Zheng, LH Zhu, M Shen, F Gao, C Zhang… - Journal of Computer …, 2018 - Springer
With the development of network technology and cloud computing, data sharing is becoming
increasingly popular, and many scholars have conducted in-depth research to promote its …

Entropy measures and unconditional security in cryptography

C Cachin - 1997 - research-collection.ethz.ch
One of the most important properties of a cryptographic system is a proof of its security. In the
present work, information-theoretic meth¬ ods are used for proving the security of …

Two secret sharing schemes based on Boolean operations

D Wang, L Zhang, N Ma, X Li - Pattern Recognition, 2007 - Elsevier
Traditional secret sharing schemes involve complex computation. A visual secret sharing
(VSS) scheme decodes the secret without computation, but each shadow is m times as big …