Learn More
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet of Things. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, we make the first attempt to formally model the(More)
— The data secrecy of outsourced files in cloud server should be protected even though cloud servers are untrustworthy. In this paper, we extensively analyze the techniques on data privacy protection for secure cloud storage. We propose and compare several general paradigms on data secrecy protection including ID-based scheme, CLPKC-based scheme,(More)
—An outlier mining based algorithm is presented to detect dim target in sea and sky background infrared image sequences. Firstly, according to the characteristic that dim target intensity is not correlation with background, viewed the target pixels as outliers; and then used an outlier mining algorithm based on local reachability density (lrd) to detect the(More)