×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [5]
软件研究所 [3]
北京大学 [1]
兰州理工大学 [1]
兰州大学 [1]
计算技术研究所 [1]
更多...
内容类型
期刊论文 [9]
会议论文 [6]
发表日期
2021 [1]
2020 [1]
2018 [1]
2017 [1]
2016 [1]
2014 [3]
更多...
学科主题
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A blockchain-empowered crowdsourcing system for 5G-enabled smart cities *
期刊论文
COMPUTER STANDARDS & INTERFACES, 2021, 卷号: 76, 页码: 21
作者:
Tan, Liang
;
Xiao, Huan
;
Yu, Keping
;
Aloqaily, Moayad
;
Jararweh, Yaser
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/12/01
Blockchain
Edge-enabled
Crowdsourcing
Smart contract
5G
Monogamy relations within quadripartite Einstein-Podolsky-Rosen steering based on cascaded four-wave mixing processes
期刊论文
PHYSICAL REVIEW A, 2020, 卷号: 101, 期号: 5
作者:
Xiang, Yu
;
Liu, Yang
;
Cai, Yin
;
Li, Feng
;
Zhang, Yanpeng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/05/29
A secure and targeted mobile coupon delivery scheme using blockchain
会议论文
作者:
Gu, Yingjie
;
Gui, Xiaolin
;
Xu, Pan
;
Gui, Ruowei
;
Zhao, Yingliang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/19
Analysis and simulation
Behavioral profiles
Data contracts
Encryption algorithms
Non repudiation
Targeted coupon delivery
Transfer of information
Trusted third parties
Cooperative dynamic data possession scheme across a cloud storage environment
期刊论文
Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 卷号: 57, 期号: 10, 页码: 1048-1055
作者:
Cao, Laicheng
;
He, Wenwen
;
Liu, Yufei
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Digital storage
Network security
Cloud service providers
Cloud storage securities
Cloud storage services
Cooperative dynamics
Dynamic data
Dynamic operations
Integrity verifications
Trusted third parties
HSKAS: A novel hierarchical shared key authentication scheme in wireless sensor networks
期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: [db:dc_citation_issue], 页码: 105-116
作者:
Sun, Zeyu
;
Ji, Xiaohui
;
Li, Yuanbo
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/02
Authentication scheme
Communication overheads
Communication radius
Influence of environments
Shared key
Shared key authentication
Trusted third parties
Wireless sensor network (WSNs)
A Novel Community-Based Trust Model for P2P Networks
会议论文
作者:
Wang, Songxin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/08/22
P2P networks
Trust model
P2P community
基于可信芯片的平台身份证明方案研究
期刊论文
通信学报, 2014, 卷号: 35, 期号: 8, 页码: 95-106
张倩颖
;
冯登国
;
赵世军
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2014/12/16
可信计算
平台身份证明
协议组合逻辑
匿名性
trusted computing
platform identity attestation
protocol composition logic
anonymity
E-marketing under the adverse selection environment: model and case study
期刊论文
International Journal of Networking and Virtual Organisations, 2014, 卷号: Vol.14 No.1-2, 页码: 111-128
作者:
YongPan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
adverse
selection
qualitative
preference
quality
intermediaries
China
e-commerce
markets
electronic
commerce
e-marketing
electronic
marketing
information
asymmetry
modelling
consumer
preferences
reputation
evaluation
business
alliances
trusted
third
parties
market
quality
experts
cyber
lemons.
An ID-based certified e-mail protocol with STTP suitable for wireless mobile environments
期刊论文
Journal of Computers, 2013, 卷号: 8, 期号: 1, 页码: 3-9
作者:
Wang, Caifen
;
Lan, Caihui
;
Niu, Shufen
;
Cao, Xiaojun
;
Gong, Minan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2016/07/15
Certification process
Certified e-mail
Communication cost
Fair exchange
ID-based
ID-based cryptography
Id-based public key cryptographies
Identity-based signcryption
Public key authentication
Re-encryption
Semi-trusted third parties
Signcryption
Trusted third parties
Wireless mobile environments
new optimistic fair exchange protocol based on short signature
会议论文
2nd International Conference on Communication Software and Networks, ICCSN 2010, Singapore, Singapore, 40576
Sun Yanbin
;
Gu Lize
;
Qing Sihan
;
Zheng Shihui
;
Yang Yixian
;
Sun Yan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2011/03/31
Computer software
Network security
©版权所有 ©2017 CSpace - Powered by
CSpace