×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [10]
西安交通大学 [3]
北京航空航天大学 [2]
北京大学 [1]
内容类型
期刊论文 [13]
会议论文 [2]
其他 [1]
发表日期
2022 [2]
2021 [1]
2019 [3]
2018 [4]
2016 [2]
2014 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共16条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Blockchain data privacy access control based on searchable attribute encryption
期刊论文
Computers, Materials and Continua, 2021, 卷号: 66, 期号: 1, 页码: 871-884
作者:
Feng, Tao
;
Pei, Hongmei
;
Ma, Rong
;
Tian, Youliang
;
Feng, Xiaoqin
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Access control
Blockchain
Predictive analytics
Privacy by designAccess structure
Authorized users
Data privacy protections
Exposure problem
Hierarchical attributes
Prediction model
Searchable encryptions
Transaction information
Algorithm of blockchain data provenance based on ABE
期刊论文
Tongxin Xuebao/Journal on Communications, 2019, 卷号: 40, 期号: 11, 页码: 101-111
作者:
Tian, Youliang
;
Yang, Kedi
;
Wang, Zuan
;
Feng, Tao
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Blockchain
Data privacy
Data Sharing
Information dissemination
Visibility
Attribute-based encryptions
Data provenance
Dynamic protections
Experimental simulations
Ho-momorphic encryptions
Privacy protection
Traceability information
Zero knowledge proof
Cloud Storage Scheme on Attribute Blinding Fuzzy Searchable Encryption
期刊论文
Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 卷号: 39, 期号: 7, 页码: 706-713
作者:
Cao, Lai-Cheng
;
Wang, Wei-Ting
;
Kang, Yi-Fan
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Data privacy
Digital storage
Network security
Attribute blinding
Ciphertext-policy attribute-based encryptions
Cloud storages
Pre-decryption
Searchable encryptions
An efficient and anonymous KP-ABE scheme with keyword search
会议论文
Kowloon, Hong kong, June 25, 2018 - June 27, 2018
作者:
Feng, Tao
;
Yin, Xiaoyu
;
Liu, Chunyan
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Search engines
Approximate greatest common divisors
Cloud storage systems
Cloud storages
Ho-momorphic encryptions
Identity authentication
KP-ABE
PEKS
Privacy preserving
User privacy-preserving cloud storage scheme on CP-ABE
期刊论文
Qinghua Daxue Xuebao/Journal of Tsinghua University, 2018, 卷号: 58, 期号: 2, 页码: 150-156
作者:
Cao, Laicheng
;
Liu, Yufei
;
Dong, Xiaoye
;
Guo, Xian
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Digital storage
Security of data
Attribute-based encryptions
Cloud storages
Distributed proxies
Privacy preserving
Searchable encryptions
Attribute-based encryption supporting data filtration over post-quantum assumptions
期刊论文
International Journal of Electronic Security and Digital Forensics, 2018, 卷号: 10, 页码: 323-337
作者:
Jiao, Chunhong
;
Xiang, Xinyin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/19
Attribute based encryption (ABE)
Attribute-based encryptions
Authentication information
Chosen-plaintext attack
Cryptographic primitives
Data filtration
Efficient construction
Post quantum
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10726 LNCS, 页码: 278-298
作者:
Feng, H.
;
Liu, J.
;
Wu, Q.
;
Liu, W.
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
Access control
Cloud computing
Digital storage
Public key cryptography
Security of data
Attribute-based
Cloud computing securities
Encrypted data
Fine grained
Fully homomorphic encryption
Generic construction
Key encapsulation mechanisms
Predicate encryptions
Cryptography
RWAC: A Self-contained Read and Write Access Control Scheme for Group Collaboration
会议论文
Proceedings - IEEE Symposium on Computers and Communications
作者:
Wang, J.
;
Lang, B.
;
Zhu, R.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Cryptography
Digital devices
Digital storage
Access control models
Attribute-based encryptions
Ciphertext-policy attribute-based encryptions
Group collaboration
Group signatures
Personal digital devices
Read and write access control
Signature generation
Access control
©版权所有 ©2017 CSpace - Powered by
CSpace