CORC

浏览/检索结果: 共29条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Privacy-preserving and publicly verifiable protocol for outsourcing polynomials evaluation to a malicious cloud 期刊论文
International Journal of Digital Crime and Forensics, 2019, 卷号: 11, 期号: 4, 页码: 14-27
作者:  Xie, Dawei;  Yang, Haining;  Qin, Jing;  Ma, Jixin
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/11
An improved scheme for outsourced computation with attribute-based encryption 会议论文
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), DEC 13-15, 2017
作者:  Yang, Haining;  Sun, Jiameng
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/31
An improved scheme for outsourced computation with attribute-based encryption 期刊论文
Concurrency Computation, 2018
作者:  Yang H.;  Sun J.;  Qin J.;  Ma J.
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/11
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 45725-45739
作者:  Ge, Xinrui;  Yu, Jia;  Hu, Chengyu;  Zhang, Hanlin;  Hao, Rong
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/11
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2018
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Ma, Jixin
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/11
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks 期刊论文
Mobile Networks and Applications, 2018
作者:  Hu C.;  Li Z.;  Liu P.;  Yang R.;  Guo S.
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps 期刊论文
SOFT COMPUTING, 2018, 卷号: 22, 期号: 7, 页码: 2267-2274
作者:  Wang, Hao;  He, Debiao;  Shen, Jian;  Zheng, Zhihua;  Yang, Xiaoyan
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Verifiable sufficient conditions for the error bound property of second-order cone complementarity problems 期刊论文
MATHEMATICAL PROGRAMMING, 2018, 卷号: 171, 期号: 1-2, 页码: 361-395
作者:  Ye, Jane J.;  Zhou, Jinchuan
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/11
Confidentiality-Preserving Publicly Verifiable Computation 期刊论文
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 卷号: 28, 期号: 6, 页码: 799-818
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/12
A confidentiality preserving publicly verifiable computation for multivariate polynomials 期刊论文
Proceedings - 2017 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2017, 2017, 页码: 5-12
作者:  Jiameng, Sun;  Binrui, Zhu;  Jing, Qin;  Jixin, Ma
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/12


©版权所有 ©2017 CSpace - Powered by CSpace