×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [4]
北京航空航天大学 [2]
山东大学 [2]
暨南大学 [2]
兰州理工大学 [1]
中国科学院大学 [1]
更多...
内容类型
期刊论文 [9]
会议论文 [5]
发表日期
2018 [2]
2017 [2]
2016 [1]
2015 [2]
2012 [1]
2011 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共14条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Efficient pairing-free PRE schemes for multimedia data sharing in IoT
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 页码: 18327-18354
作者:
Hu, Xing
;
Tang, Chunming
;
Wong, Duncan S.
;
Zheng, Xianghan
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/21
Public verifiability
CCA security
Proxy re-encryption
Without pairing
Multimedia data security
The Public Verifiability of Public Key Encryption with Keyword Search
期刊论文
MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 卷号: 235, 页码: 299-312
作者:
Zhu, Binrui
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/11
Cloud computing
PEKS
Public verifiability
Indistinguishability
A Verifiable Sealed-Bid Multi-Qualitative-Attribute Based Auction Scheme in the Semi-Honest Model
期刊论文
2017, 卷号: 5, 页码: 12360-12368
作者:
Shi, Wenbo
;
Wei, Wei
;
Wang, Jiaqi
;
Zhao, Qingchun
;
Lin, Zhuo
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/20
Multi-attribute e-auction
bid privacy
public verifiability
semi-honest model
multi-party computation
Efficient integrity verification of replicated data in cloud computing system
期刊论文
COMPUTERS & SECURITY, 2017, 卷号: 65, 页码: 202-212
作者:
Yi, Mingxu
;
Wei, Jinxia
;
Song, Lingwei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Fully homomorphic encryption
Data replication
Data dynamics
Public verifiability
Cloud service provider
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
期刊论文
Security and communication networks, 2016, 卷号: 9, 期号: 12, 页码: 1748-1758
作者:
Lin, Suqing
;
Zhang, Rui
;
Wang, Mingsheng
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2019/05/09
Attribute-based proxy re-encryption
Verifiability
Master key security
Data packets bidirectional anonymous identity privacy protection scheme for named data networking
期刊论文
Journal of Computational Information Systems, 2015, 卷号: 11, 期号: 11, 页码: 3987-3998
作者:
Feng, Tao
;
Zhou, Tao
;
Guo, Xian
;
Liu, Chunyan
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2020/11/14
Cryptography
Internet service providers
Bidirectional anonymity
Content packets
Multiple receivers
Named data networkings
Privacy information
A distributed secret share update scheme with public verifiability for ad hoc network
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 页码: 1485-1493
作者:
Chen Zhenhua
;
Li Shundong
;
Wu Qianhong
;
Huang Qiong
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/01/06
distributed secret share update
mobile ad hoc network
public verifiability
homomorphism
verifiable encryption
dynamic provable data possession with batch-update verifiability
会议论文
2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment, ICADE 2012, Beijing, China, July 27, 2012 - July 29, 2012
Wang Junxiang
;
Liu Shengli
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2013/09/22
Intelligent control
Trees (mathematics)
new chosen ciphertext secure public key encryption in the standard model with public verifiability
会议论文
7th International Conference on Intelligent Computing, ICIC 2011, Zhengzhou, China, August 11,
Weng Zhiwei
;
Weng Jian
;
He Kai
;
Li Yingkai
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2013/10/08
Computation theory
Intelligent computing
on the invisibility of designated confirmer signatures
会议论文
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22,
Xia Fubiao
;
Wang Guilin
;
Xue Rui
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2011/10/10
Authentication
Network security
©版权所有 ©2017 CSpace - Powered by
CSpace