CORC

浏览/检索结果: 共14条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Efficient pairing-free PRE schemes for multimedia data sharing in IoT 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 页码: 18327-18354
作者:  Hu, Xing;  Tang, Chunming;  Wong, Duncan S.;  Zheng, Xianghan
收藏  |  浏览/下载:6/0  |  提交时间:2019/11/21
The Public Verifiability of Public Key Encryption with Keyword Search 期刊论文
MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 卷号: 235, 页码: 299-312
作者:  Zhu, Binrui;  Sun, Jiameng;  Qin, Jing;  Ma, Jixin
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/11
A Verifiable Sealed-Bid Multi-Qualitative-Attribute Based Auction Scheme in the Semi-Honest Model 期刊论文
2017, 卷号: 5, 页码: 12360-12368
作者:  Shi, Wenbo;  Wei, Wei;  Wang, Jiaqi;  Zhao, Qingchun;  Lin, Zhuo
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/20
Efficient integrity verification of replicated data in cloud computing system 期刊论文
COMPUTERS & SECURITY, 2017, 卷号: 65, 页码: 202-212
作者:  Yi, Mingxu;  Wei, Jinxia;  Song, Lingwei
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing 期刊论文
Security and communication networks, 2016, 卷号: 9, 期号: 12, 页码: 1748-1758
作者:  Lin, Suqing;  Zhang, Rui;  Wang, Mingsheng
收藏  |  浏览/下载:24/0  |  提交时间:2019/05/09
Data packets bidirectional anonymous identity privacy protection scheme for named data networking 期刊论文
Journal of Computational Information Systems, 2015, 卷号: 11, 期号: 11, 页码: 3987-3998
作者:  Feng, Tao;  Zhou, Tao;  Guo, Xian;  Liu, Chunyan
收藏  |  浏览/下载:5/0  |  提交时间:2020/11/14
A distributed secret share update scheme with public verifiability for ad hoc network 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 页码: 1485-1493
作者:  Chen Zhenhua;  Li Shundong;  Wu Qianhong;  Huang Qiong
收藏  |  浏览/下载:13/0  |  提交时间:2020/01/06
dynamic provable data possession with batch-update verifiability 会议论文
2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment, ICADE 2012, Beijing, China, July 27, 2012 - July 29, 2012
Wang Junxiang; Liu Shengli
收藏  |  浏览/下载:9/0  |  提交时间:2013/09/22
new chosen ciphertext secure public key encryption in the standard model with public verifiability 会议论文
7th International Conference on Intelligent Computing, ICIC 2011, Zhengzhou, China, August 11,
Weng Zhiwei; Weng Jian; He Kai; Li Yingkai
收藏  |  浏览/下载:13/0  |  提交时间:2013/10/08
on the invisibility of designated confirmer signatures 会议论文
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22,
Xia Fubiao; Wang Guilin; Xue Rui
收藏  |  浏览/下载:22/0  |  提交时间:2011/10/10


©版权所有 ©2017 CSpace - Powered by CSpace