CORC

浏览/检索结果: 共17条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Blockchain based permission delegation and access control in Internet of Things (BACI) 期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 86, 页码: 318-334
作者:  Ali, Gauhar;  Ahmad, Naveed;  Cao, Yue;  Asif, Muhammad;  Cruickshank, Haitham
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2018
作者:  Luo, Xiling;  Zhou, Zequan;  Zhong, Lin;  Mao, Jian;  Chen, Chaoyong
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
Idology and Its Applications in Public Security and Network Security 会议论文
INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017), 2017-01-01
作者:  Su, Shenghui;  Zheng, Jianhua;  Lu, Shuwang;  Huang, Zhiqiu;  Li, Zhoujun
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems 期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 卷号: 30
作者:  Mao, Jian;  Chen, Yue;  Zhang, Yan;  Xu, Xiandong;  Zhou, Yajian
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30
Efficient integrity verification of replicated data in cloud computing system 期刊论文
COMPUTERS & SECURITY, 2017, 卷号: 65, 页码: 202-212
作者:  Yi, Mingxu;  Wei, Jinxia;  Song, Lingwei
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
iPUF: Interconnect PUF with Self-Masking Circuit for Performance Enhancement 会议论文
2017 18TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR AND SOC TEST, SECURITY AND VERIFICATION (MTV 2017), 2017-01-01
作者:  Yu, Liting;  Wang, Xiaoxiao;  Rahman, Fahim;  Tehranipoor, Mark
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Confidentiality-Preserving Publicly Verifiable Computation 会议论文
10th International Conference on Provable Security (ProvSec), Nanjing Univ Finance & Econ, Nanjing, PEOPLES R CHINA, 2017-09-01
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Confidentiality-Preserving Publicly Verifiable Computation 期刊论文
10th International Conference on Provable Security (ProvSec), 2017, 卷号: 28, 页码: 799-818
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Modeling, conflict detection, and verification of a new virtualization role-based access control framework 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 页码: 1904-1925
作者:  Luo, Yang;  Xia, Chunhe;  Lv, Liangshuang;  Wei, Zhao;  Li, Yazhuo
收藏  |  浏览/下载:4/0  |  提交时间:2020/01/06
Efficient public verification proof of retrievability scheme in cloud 期刊论文
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2014, 卷号: 17, 页码: 1401-1411
作者:  Zhang, Jianhong;  Tang, Wenjing;  Mao, Jian
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/06


©版权所有 ©2017 CSpace - Powered by CSpace