×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [17]
内容类型
会议论文 [9]
期刊论文 [8]
发表日期
2019 [1]
2018 [1]
2017 [6]
2015 [1]
2014 [1]
2013 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共17条,第1-10条
帮助
限定条件
专题:北京航空航天大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Blockchain based permission delegation and access control in Internet of Things (BACI)
期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 86, 页码: 318-334
作者:
Ali, Gauhar
;
Ahmad, Naveed
;
Cao, Yue
;
Asif, Muhammad
;
Cruickshank, Haitham
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Blockchain
Internet of Things
Access control
Permission delegation
Platform verification
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2018
作者:
Luo, Xiling
;
Zhou, Zequan
;
Zhong, Lin
;
Mao, Jian
;
Chen, Chaoyong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Idology and Its Applications in Public Security and Network Security
会议论文
INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017), 2017-01-01
作者:
Su, Shenghui
;
Zheng, Jianhua
;
Lu, Shuwang
;
Huang, Zhiqiu
;
Li, Zhoujun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Idology
Symmetric identity
Asymmetric identity
Identification
Anti-fraud
Digital signature
Hash function
United verification platform
Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 卷号: 30
作者:
Mao, Jian
;
Chen, Yue
;
Zhang, Yan
;
Xu, Xiandong
;
Zhou, Yajian
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
heterogeneous sensor system
cloud computing
cloud storage security
provable data possession
integrity verification
Efficient integrity verification of replicated data in cloud computing system
期刊论文
COMPUTERS & SECURITY, 2017, 卷号: 65, 页码: 202-212
作者:
Yi, Mingxu
;
Wei, Jinxia
;
Song, Lingwei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Fully homomorphic encryption
Data replication
Data dynamics
Public verifiability
Cloud service provider
iPUF: Interconnect PUF with Self-Masking Circuit for Performance Enhancement
会议论文
2017 18TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST, SECURITY AND VERIFICATION (MTV 2017), 2017-01-01
作者:
Yu, Liting
;
Wang, Xiaoxiao
;
Rahman, Fahim
;
Tehranipoor, Mark
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
PUF
hardware security
interconnect
uniqueness enhancement
aging resistance
Confidentiality-Preserving Publicly Verifiable Computation
会议论文
10th International Conference on Provable Security (ProvSec), Nanjing Univ Finance & Econ, Nanjing, PEOPLES R CHINA, 2017-09-01
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Attribute-based encryption
confidentiality-preserving publicly verifiable computation
delegatable outsourcing computation
public verification
Confidentiality-Preserving Publicly Verifiable Computation
期刊论文
10th International Conference on Provable Security (ProvSec), 2017, 卷号: 28, 页码: 799-818
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Attribute-based encryption
confidentiality-preserving publicly verifiable computation
delegatable outsourcing computation
public verification
Modeling, conflict detection, and verification of a new virtualization role-based access control framework
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 页码: 1904-1925
作者:
Luo, Yang
;
Xia, Chunhe
;
Lv, Liangshuang
;
Wei, Zhao
;
Li, Yazhuo
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/01/06
virtualization
RBAC
policy conflict
description logic
colored petri net
Efficient public verification proof of retrievability scheme in cloud
期刊论文
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2014, 卷号: 17, 页码: 1401-1411
作者:
Zhang, Jianhong
;
Tang, Wenjing
;
Mao, Jian
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/06
Cloud computing
Proof of retrievability
Integrity checking
Security proof
©版权所有 ©2017 CSpace - Powered by
CSpace