×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [20]
北京大学 [12]
北京航空航天大学 [6]
华南理工大学 [3]
武汉大学 [3]
西安交通大学 [2]
更多...
内容类型
期刊论文 [31]
会议论文 [17]
其他 [9]
学位论文 [4]
会议 [2]
发表日期
2020 [1]
2019 [3]
2017 [6]
2016 [4]
2015 [6]
2014 [2]
更多...
学科主题
计算机科学技术基础学... [2]
Computer S... [1]
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共63条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Federated Tensor Mining for Secure Industrial Internet of Things
期刊论文
IEEE Transactions on Industrial Informatics, 2020, 卷号: 16, 期号: 3, 页码: 2144-2153
作者:
Kong LH(孔令和)
;
Liu, Xiao-Yang
;
Sheng H(盛浩)
;
Zeng P(曾鹏)
;
Chen, Guihai
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/02/17
Industrial internet of things
security
tensor-based data mining
Securing messaging services through efficient signcryption with designated equality test
期刊论文
INFORMATION SCIENCES, 2019, 卷号: 490, 页码: 146-165
作者:
Wang, Yujue
;
Pang, HweeHwa
;
Deng, Robert H.
;
Ding, Yong
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Messaging system
Encryption
Confidentiality
Authentication
Signcryption
Equality test on ciphertexts
Equijoin
Data outsourcing
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
会议论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019-11-10
作者:
Zhang, Xiao
;
Wu, Faguo
;
Yao, Wang
;
Wang, Zhao
;
Wang, Wenhua
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
ciphertext-policy attribute-based encryption
multi-authority attribute-based encryption
threshold access policy
user revocation
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 卷号: 31
作者:
Zhang, Xiao
;
Wu, Faguo
;
Yao, Wang
;
Wang, Zhao
;
Wang, Wenhua
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
ciphertext-policy attribute-based encryption
multi-authority attribute-based encryption
threshold access policy
user revocation
Generic construction of role-based encryption in the standard model
期刊论文
International Journal of Security and Networks, 2017, 卷号: 12, 页码: 198-205
作者:
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
Access control policies
Adaptive security
Ciphertexts
Cloud storages
Inner product
Partial order relation
Role hierarchy
Role-based
Role-based Access Control
User revocation
Improving DFA attacks on AES with unknown and random faults
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
Liao, Nan
;
Cui, Xiaoxin
;
Liao, Kai
;
Wang, Tian
;
Yu, Dunshan
;
Cui, Xiaole
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
AES
DFA attacks
unknown and random faults
efficient
theoretical candidate number
voltage violation
Improving DFA attacks on AES with unknown and random faults
期刊论文
Science China(Information Sciences), 2017
Nan LIAO
;
Xiaoxin CUI
;
Kai LIAO
;
Tian WANG
;
Dunshan YU
;
Xiaole CUI
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2017/12/03
AES
DFA attacks
unknown and random faults
efficient
theoretical candidate number
voltage violation
Improving DFA attacks on AES with unknown and random faults
期刊论文
Science China. Information Science, 2017
Liao Nan
;
Cui Xiaoxin
;
Liao Kai
;
Wang Tian
;
Yu Dunshan
;
Cui Xiaole
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
AES
DFA attacks
unknown and random faults
efficient
theoretical candidate number
voltage violation
hOPE:improved order preserving encryption with the power to homomorphic operations of ciphertexts
期刊论文
2017, 卷号: 60, 期号: 6, 页码: 112-128
作者:
Yanguo PENG
;
Hui LI
;
Jiangtao CUI
;
Junwei ZHANG
;
Jianfeng MA
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/05
同态加密
操作能力
密文
保序
选择明文攻击
数据库应用程序
可信第三方
安全性
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts
期刊论文
2017, 卷号: 60, 期号: 6
作者:
Peng, Yanguo
;
Li, Hui
;
Cui, Jiangtao
;
Zhang, Junwei
;
Ma, Jianfeng
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/31
©版权所有 ©2017 CSpace - Powered by
CSpace