×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [9]
内容类型
会议 [5]
会议论文 [2]
期刊论文 [2]
发表日期
2016 [1]
2015 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
限定条件
专题:华南理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Oblivious transfer with fine grained access control from ciphertext policy attribute based encryption in the standard model (EI收录)
期刊论文
International Journal of Future Generation Communication and Networking, 2016, 卷号: 9, 页码: 285-302
作者:
Fu, Xingbing[1]
;
Li, Fagen[1]
;
Zeng, Shengke[2]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/24
Access control
Computer circuits
Data privacy
Security of data
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure
期刊论文
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 卷号: 21, 页码: 454-472
作者:
Liu, Zhusong[1]
;
Yan, Hongyang[2]
;
Lin, Zhiqiang[3]
;
Xu, Lingling[4]
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/04/25
Fine-grained access control
Multi-Authority
Attribute-based encryption
Offline/online attribute-based encryption with verifiable outsourced decryption (CPCI-S收录)
会议
作者:
Liu, Zechao[1,2]
;
Jiang, Zoe L.[1,3]
;
Wang, Xuan[1,4]
;
Huang, Xinyi[5,6]
;
Yiu, S. M.[7]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/11
offline/online ABE
outsourced decryption
verifiable computation
Charm
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsorced Verifiable Computation (CPCI-S收录)
会议
作者:
Zhang, Kai[1,2]
;
Gong, Junqing[3]
;
Tang, Shaohua[4]
;
Chen, Jie[1,2]
;
Li, Xiangxue[1]
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/04/11
Verifiable computation
Outsourced computation
Attribute-based encryption
Dual system encryption
Charm
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation (EI收录)
会议
Xi'an, China,
作者:
Zhang, Kai[1,2]
;
Gong, Junqing[3]
;
Tang, Shaohua[4]
;
Chen, Jie[1,2]
;
Li, Xiangxue[1]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/11
Security of data
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator (CPCI-S收录)
会议
作者:
Chen, Yuechen[1,5]
;
Jiang, Zoe L.[1]
;
Yiu, S. M.[2]
;
Liu, Joseph K.[3]
;
Au, Man Ho[4]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/11
CP-ABE
Decryption outsourcing
Dual encryption system
Security mediator
User revocation
A Cloud-Based Access Control Scheme with User Revocation and Attribute Update (CPCI-S收录)
会议
作者:
Zhang, Peng[1]
;
Chen, Zehong[1]
;
Liang, Kaitai[2]
;
Wang, Shulan[1]
;
Wang, Ting[1,3]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/11
Cloud
Access control
Attribute-based encryption
User revocability
Attribute update
Threshold ciphertext policy attribute-based encryption with constant size ciphertexts (EI收录)
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Wollongong, NSW, Australia, July 9, 2012 - July 11, 2012
作者:
Ge, Aijun[1]
;
Zhang, Rui[2]
;
Chen, Cheng[2]
;
Ma, Chuangui[1]
;
Zhang, Zhenfeng[2]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/15
Security of data
Ciphertext policy attribute-based encryption from lattices: Extended abstract (EI收录)
会议论文
ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security, Seoul, Korea, Republic of, May 2, 2012 - May 4, 2012
作者:
Zhang, Jiang[1]
;
Zhang, Zhenfeng[1]
;
Ge, Aijun[2]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/15
Abstracting
Security of data
©版权所有 ©2017 CSpace - Powered by
CSpace