×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [15]
北京大学 [9]
上海电子信息职业技术... [9]
西安交通大学 [8]
北京航空航天大学 [7]
厦门大学 [6]
更多...
内容类型
期刊论文 [52]
会议论文 [29]
其他 [7]
学位论文 [5]
专利 [3]
会议 [3]
更多...
发表日期
2022 [1]
2021 [1]
2020 [1]
2019 [8]
2018 [10]
2017 [14]
更多...
学科主题
Computer S... [2]
计算机科学技术基础学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共99条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
A non-interactive verifiable computation model of perceptual layer data based on CP-ABE
会议论文
Guangzhou, China, January 14-16, 2022
作者:
Zhao JM(赵剑明)
;
Miao, Weiwei
;
Zeng, Zeng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/13
CP-ABE
non-interactive verifiable computation
NPOT
A blockchain-assisted framework for secure and reliable data sharing in distributed systems
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 卷号: 2021, 期号: 1, 页码: 19
作者:
Guo, Yu
;
Wang, Shenling
;
Huang, Jianhui
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2021/12/01
Dynamic searchable encryption
Distributed data storage
Forward security
Smart contract
Blockchain
Large spatial variations in the distributions of and factors affecting forest water retention capacity in China
期刊论文
ECOLOGICAL INDICATORS, 2020, 卷号: 113, 页码: 16
作者:
Wu, Xi
;
Shi, Wenjiao
;
Guo, Bin
;
Tao, Fulu
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/05/19
China
Forest water retention
Meta-analysis
Path analysis
Spatial distribution
Factor
Provincial and sector-level material footprints in China
期刊论文
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2019, 卷号: 116, 期号: 52, 页码: 26484-26490
作者:
Jiang, Meng
;
Behrens, Paul
;
Wang, Tao
;
Tang, Zhipeng
;
Yu, Yadong
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/05/19
material footprint
environmentally extended multiregional input-output (EE-MRIO)
subnational
China
An alternative approach to public cloud data auditing supporting data dynamics
期刊论文
Soft Computing, 2019, 卷号: 23, 期号: 13, 页码: 4939-4953
作者:
Wang, Tao
;
Yang, Bo*
;
Liu, Hongyu
;
Yu, Yong
;
Qiu, Guoyong
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2019/12/04
Provable data possession
Cloud data auditing
Verifiable data outsourcing
Standard model
PPM: Privacy Protection Method for Outsourcing Data Entry
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 29745-29753
作者:
Li, Fengqi
;
Shang, Chunli
;
Liu, Kemeng
;
Pang, Aidi
;
Huang, Sikai
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/02
Image segmentation
outsourcing data entry
privacy protection
privacy association separation
sub-image allocation
Privacy preserving weighted similarity search scheme for encrypted data
期刊论文
IET INFORMATION SECURITY, 2019, 卷号: 13, 页码: 61-69
作者:
Guo, Cheng
;
Tian, Pengxu
;
Chang, Chin-Chen
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/02
cryptography
outsourcing
cloud computing
data privacy
different weighted searches
encrypted data
searchable symmetric encryption
data users
search request
homomorphic encryption
weight problem
weight information
weighted similarity search scheme
cloud computing
outsourced data
privacy concerns
searchable encryption
different users
different requirements
Efficient Authentication of Multi-Dimensional Top-$k$Queries
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 4748-4762
作者:
Xiaoyu Zhu
;
Jie Wu
;
Wei Chang
;
Guojun Wang
;
Qin Liu
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/13
Authentication
Servers
Cloud
computing
Databases
Diabetes
Computational
modeling
Data
outsourcing
multi-dimension
query
authentication
signature
chain
top-kquery
Efficient Authentication of Multi-Dimentional Top-k Queries
期刊论文
IEEE ACCESS, 2019, 卷号: Vol.7, 页码: 4748-4762
作者:
Zhu, XY
;
Wu, J
;
Chang, W
;
Wang, GJ
;
Liu, Q
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/17
Data outsourcing
multi-dimension
query authentication
signature chain
top-k query
Securing messaging services through efficient signcryption with designated equality test
期刊论文
INFORMATION SCIENCES, 2019, 卷号: 490, 页码: 146-165
作者:
Wang, Yujue
;
Pang, HweeHwa
;
Deng, Robert H.
;
Ding, Yong
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Messaging system
Encryption
Confidentiality
Authentication
Signcryption
Equality test on ciphertexts
Equijoin
Data outsourcing
©版权所有 ©2017 CSpace - Powered by
CSpace