×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [8]
重庆大学 [7]
上海大学 [6]
北京航空航天大学 [5]
山东大学 [5]
北京大学 [3]
更多...
内容类型
期刊论文 [28]
会议论文 [15]
会议 [1]
其他 [1]
发表日期
2022 [1]
2019 [3]
2018 [4]
2017 [10]
2016 [8]
2015 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共45条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
A non-interactive verifiable computation model of perceptual layer data based on CP-ABE
会议论文
Guangzhou, China, January 14-16, 2022
作者:
Zhao JM(赵剑明)
;
Miao, Weiwei
;
Zeng, Zeng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/13
CP-ABE
non-interactive verifiable computation
NPOT
OOABKS: Online/Offline Attribute-based Encryption for Keyword Search in Mobile Cloud
期刊论文
Information Sciences, 2019
作者:
Jie Cui
;
Yan Xu
;
Hong Zhong
;
Han Zhou
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/04/24
Cloud computing
Attribute-based keyword search
Online/offline technology
Outsourcing computation
Privacy protection
Secure Multi-Party Computation: Theory, practice and applications
期刊论文
INFORMATION SCIENCES, 2019, 卷号: 476, 页码: 357-372
作者:
Zhao, Chuan
;
Zhao, Shengnan
;
Zhao, Minghao
;
Chen, Zhenxiang
;
Gao, Chong-Zhi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/11
Secure Multi-Party Computation
Generic protocol
Cloud security
Secure
outsourcing
Privacy-preserving technology
An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 卷号: 15, 期号: 12, 页码: 6500-6509
作者:
Li, JQ (Li, Jianqiang)[ 1 ]
;
Wang, SL (Wang, Shulan)[ 2 ]
;
Li, Y (Li, Yuan)[ 1 ]
;
Wang, HY (Wang, Haiyan)[ 1 ]
;
Wang, HW (Wang, Huiwen)[ 1 ]
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2020/01/10
Encryption
Cloud computing
Outsourcing
Informatics
Computational efficiency
Attribute-based encryption (ABE)
ciphertext policy (CP)
Cloud computing
file update
policy update
An IBE Scheme with Verifiable Outsourced Key Generation Based on a Single Server
期刊论文
IETE TECHNICAL REVIEW, 2018, 卷号: 35, 页码: 97-105
作者:
Xue, Ting[1]
;
Ren, Yanli[2]
;
Feng, Guorui[3]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/22
Identity-based encryption
Private key generation
Verifiable outsourcing computation
Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server
期刊论文
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, 卷号: E101A, 页码: 608-611
作者:
Dong, Min[1]
;
Ren, Yanli[2]
;
Feng, Guorui[3]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/22
cloud computing
outsourcing computation
modular exponentiation
fully verifiable
single server
AKSER: Attribute-based keyword search with efficient revocation in cloud computing(Article)
期刊论文
Information Sciences, 2018, 卷号: Vol.423, 页码: 343-352
作者:
Xu, Y.
;
Zhou, H.
;
Cui, J.
;
Zhong, H.
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/04/24
Attribute-based
encryption
Cloud
computing
Efficient
revocation
Multi-keyword
search
Outsourcing
computation
Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 52248-52260
作者:
Feng, Xiaoqin
;
Ma, Jianfeng
;
Feng, Tao
;
Miao, Yinbin
;
Liu, Ximeng
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/15
Outsourcing feature extraction
consortium chain
smart contract
DAC
sharding technique
D2D communication
Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks
期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 卷号: 18, 期号: 10, 页码: 2629-2641
作者:
Xia, Yingjie
;
Chen, Wenzhi
;
Liu, Xuejiao
;
Zhang, Luming
;
Li, Xuelong
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2017/12/25
Attributed-based Encryption
Outsourcing Decryption
Multimedia Message
Vehicular Ad-hoc Networks
Decision Tree
Secure Outsourcing of Virtual Appliance
期刊论文
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 卷号: 5, 期号: 3, 页码: 390-404
作者:
Xia, Yubin
;
Liu, Yutao
;
Guan, Haibing
;
Chen, Yunji
;
Chen, Tianshi
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2019/12/10
Computer architecture
virtual machine
secure processor
cloud computing
security
computation outsourcing
©版权所有 ©2017 CSpace - Powered by
CSpace