×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [9]
兰州理工大学 [1]
西安交通大学 [1]
大连理工大学 [1]
北京航空航天大学 [1]
山东大学 [1]
更多...
内容类型
会议论文 [17]
发表日期
2019 [1]
2016 [1]
2013 [3]
2012 [2]
2011 [3]
2010 [5]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共17条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
会议论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019-11-10
作者:
Zhang, Xiao
;
Wu, Faguo
;
Yao, Wang
;
Wang, Zhao
;
Wang, Wenhua
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
ciphertext-policy attribute-based encryption
multi-authority attribute-based encryption
threshold access policy
user revocation
Fully Homomorphic Public-Key Encryption with Two Ciphertexts based on Discrete Logarithm Problem
会议论文
Int. Conf. Info. Comm. Sec.
作者:
Tian Y(田园)
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/09
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
;
Ling San
;
Wang Huaxiong
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2013/09/22
Concrete construction
Concretes
Network security
weak keys of the full misty1 block cipher for related-key differential cryptanalysis
会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Lu Jiqiang
;
Yap Wun-She
;
Wei Yongzhuang
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2013/09/22
Lyapunov methods
Security of data
Based on the attribute encrypted cloud storage scheme
会议论文
Shiyan, Hubei, China, June 21, 2013 - June 23, 2013
作者:
Zhu, Li-Ye
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2020/11/15
Cryptography
Access control models
Access control policies
Ciphertexts
Cloud storage services
Cloud storages
Conspiracy attack
Formatting
Security problems
biclique cryptanalysis of reduced-round piccolo block cipher
会议论文
8th International Conference on Information Security Practice and Experience, ISPEC 2012, Hangzhou, China, April 9, 2012 - April 12, 2012
Wang Yanfeng
;
Wu Wenling
;
Yu Xiaoli
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2013/09/22
Security of data
Security systems
selective opening chosen ciphertext security directly from the ddh assumption
会议论文
6th International Conference on Network and System Security, NSS 2012, Wuyishan, Fujian, China, November 21, 2012 - November 23, 2012
Liu Shengli
;
Zhang Fangguo
;
Chen Kefei
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2013/09/22
Public key cryptography
fault propagation pattern based relevant faulty ciphertexts filtering towards dfa on aes
会议论文
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Wang Na
;
Zhou Yongbin
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2011/10/10
Filtration
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
会议论文
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng
;
Zhang Zhenfeng
;
Feng Dengguo
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2011/10/10
Efficiency
Hash functions
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
会议论文
10th International Conference on Cryptography and Network Security, CANS 2011, December 10, 2011 - December 12, 2011
作者:
Okamoto, Tatsuaki
;
Takashima, Katsuyuki
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
©版权所有 ©2017 CSpace - Powered by
CSpace