News

IGIS Tech Notes describe workflows and techniques for using geospatial science and technologies in research and extension.
In traditional public key encryption schemes, data encrypted by a public key pk can be decrypted only by a secret key sk corresponding to pk, and their relation between pk and sk is static.Therefore, ...
Due to the introduction of cloud computing in healthcare services, personal health records (PHRs) have being uploaded to cloud servers in increasing numbers. Since data confidentiality requirements ...