×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [2]
软件研究所 [2]
自动化研究所 [1]
西安光学精密机械研究... [1]
内容类型
会议论文 [3]
期刊论文 [3]
发表日期
2024 [1]
2022 [1]
2017 [1]
2013 [1]
2012 [1]
2011 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共6条,第1-6条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:
Yongxia Shi
;
Ehsan Nekouei
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/03/18
Cyber-security
encrypted control
event-triggered control (ETC)
networked control systems (NCSs)
semi-homomorphic encryption
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks
期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 卷号: 18, 期号: 10, 页码: 2629-2641
作者:
Xia, Yingjie
;
Chen, Wenzhi
;
Liu, Xuejiao
;
Zhang, Luming
;
Li, Xuelong
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2017/12/25
Attributed-based Encryption
Outsourcing Decryption
Multimedia Message
Vehicular Ad-hoc Networks
Decision Tree
Based on the attribute encrypted cloud storage scheme
会议论文
Shiyan, Hubei, China, June 21, 2013 - June 23, 2013
作者:
Zhu, Li-Ye
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2020/11/15
Cryptography
Access control models
Access control policies
Ciphertexts
Cloud storage services
Cloud storages
Conspiracy attack
Formatting
Security problems
ciphertext policy attribute-based encryption from lattices: extended abstract
会议论文
7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, Seoul, Korea, Republic of, May 2, 2012 - May 4, 2012
Zhang Jiang
;
Zhang Zhenfeng
;
Ge Aijun
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2013/09/22
Abstracting
Security of data
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
会议论文
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng
;
Zhang Zhenfeng
;
Feng Dengguo
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2011/10/10
Efficiency
Hash functions
©版权所有 ©2017 CSpace - Powered by
CSpace