CORC

浏览/检索结果: 共53条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Design Issues in Permissioned Blockchains for Trusted Computing 其他
2017-01-01
Tsai, Wei-Tek; Bai, Xiaoying; Yu, Lian
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
A Survey on Wi-Fi based Contactless Activity Recognition 其他
2016-01-01
Ma, Junyi; Wang, Hao; Zhang, Daqing; Wang, Yasha; Wang, Yuxiang
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security 其他
2015-01-01
Su, Shenghui; Lu, Shuwang; Xu, Maozhi
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
SCRHM: A Secure Continuous Remote Health Monitoring System 期刊论文
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015
Dong, Qiuxiang; Guan, Zhi; Gao, Kunlun; Chen, Zhong
收藏  |  浏览/下载:4/0  |  提交时间:2017/12/03
From Complex Event Processing to Cognitive Event Processing: Approaches, Challenges and Opportunities 其他
2015-01-01
Yang, Jun; Ma, Meng; Wang, Ping; Liu, Ling
收藏  |  浏览/下载:8/0  |  提交时间:2017/12/03
Unsupervised Human Activity Segmentation Applying Smartphone Sensor for Healthcare 其他
2015-01-01
Ling, Yin; Wang, Heng
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Ubiquitous Intelligent Computing in 10 Years VS Chinese Kungfu 其他
2015-01-01
Ma, Liantao; Wang, Yibo; Ma, Junyi; He, Yuanduo; Qui, Zhaopeng; Qin, Zhengyang; Wang, Yasha
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
An identity-based conditional proxy re-encryption in cloud computing environments 其他
2014-01-01
Meng, Xian Yong; Chen, Zhong; Meng, Xiang Yu; Sun, Bing
收藏  |  浏览/下载:6/0  |  提交时间:2015/11/13
A novel proxy re-encryption with keyword search 其他
2014-01-01
Meng, Xian Yong; Chen, Zhong; Meng, Xiang Yu
收藏  |  浏览/下载:6/0  |  提交时间:2015/11/13
Fine-grained document sharing using attribute-based encryption in cloud servers 其他
2013-01-01
Xu, Dongyang; Luo, Fengying; Gao, Lin; Tang, Zhi
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/17


©版权所有 ©2017 CSpace - Powered by CSpace