Learn More
While outsourcing data to cloud, security and efficiency issues should be taken into account. However, it is very challenging to design a secure and efficient mechanism supporting authorization updates. In this paper, we aim to provide a mechanism supporting authorization updates which only incurs a lightweight cost of authorization updates and meanwhile(More)
Enormous applications which are enabled using Vehicular Ad Hoc Networks (VANETs) require a both efficient and reliable data delivery. Visible Light Communication (VLC), which has high transmission rate without using Radio Frequency (RF) spectrum, is regard as a candidate for data transmission in VANETs. Since a VLC system requires a line-of-sight(More)
In this paper, a reversible authentication scheme based on prediction-error expansion (PEE) is proposed. Firstly, the compound symbolic chaos sequence as well as image block pixel bits and position-bits are input into a hash function to produce hash-bits. Then exclusive-or operation, between the label-bits taken from the chaos sequence and hash-bits, is(More)