×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [25]
北京大学 [21]
山东大学 [14]
华南理工大学 [7]
武汉大学 [6]
中国科学院大学 [5]
更多...
内容类型
期刊论文 [60]
会议论文 [27]
其他 [19]
学位论文 [5]
会议 [2]
发表日期
2021 [7]
2020 [2]
2019 [5]
2018 [9]
2017 [3]
2016 [4]
更多...
学科主题
Computer S... [1]
计算机科学技术基础学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共113条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
An ACP-Based Parallel Approach for Color Image Encryption Using Redundant Blocks
期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 页码: 16
作者:
Zheng, Wenbo
;
Yan, Lan
;
Gou, Chao
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2022/01/27
Encryption
DNA
Color
Resists
Computational modeling
Image coding
Complex systems
Artificial image and parallel execution (ACP) method
color image encryption
computational experiment
image division block
parallel computing
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project
期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 18
作者:
Li, Haoyu
;
Liu, Renzhang
;
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
收藏
  |  
浏览/下载:57/0
  |  
提交时间:2021/06/01
Ciphertext-only attack
Compact-LWE
NIST
post-quantum cryptography
NeuroAED: Towards Efficient Abnormal Event Detection in Visual Surveillance With Neuromorphic Vision Sensor
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 923-936
作者:
Chen, Guang
;
Liu, Peigen
;
Liu, Zhengfa
;
Tang, Huajin
;
Hong, Lin
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2021/01/07
Neuromorphics
Vision sensors
Event detection
Cameras
Feature extraction
Legged locomotion
Signal processing algorithms
Abnormal event detection
video surveillance
optical flow
event based descriptors
neuromorphic vision sensor
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 12, 页码: 1877-1890
作者:
null Mamta
;
Brij B. Gupta
;
Kuan-Ching Li
;
Victor C. M. Leung
;
Kostas E. Psannis
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2021/09/03
Cloud-based cyber-physical systems (CCPS)
data encryption
healthcare information search and retrieval
keyword search
public-key cryptosystems
searchable encryption
Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption
期刊论文
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 卷号: 66, 期号: 1, 页码: 871-884
作者:
Feng, Tao
;
Pei, Hongmei
;
Ma, Rong
;
Tian, Youliang
;
Feng, Xiaoqin
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2021/03/12
Blockchain
privacy protection
attribute encryption
access control
searchable-encryption
Blockchain data privacy access control based on searchable attribute encryption
期刊论文
Computers, Materials and Continua, 2021, 卷号: 66, 期号: 1, 页码: 871-884
作者:
Feng, Tao
;
Pei, Hongmei
;
Ma, Rong
;
Tian, Youliang
;
Feng, Xiaoqin
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Access control
Blockchain
Predictive analytics
Privacy by designAccess structure
Authorized users
Data privacy protections
Exposure problem
Hierarchical attributes
Prediction model
Searchable encryptions
Transaction information
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2020/10/12
decoding
public key cryptography
quantum cryptography
computational complexity
optimisation
cyclic codes
IND-CPA security
NIST PQC project
hamming quasicyclic cryptosystem
code-based key encapsulation mechanism
NIST standardisation process
public-key encryption scheme
IND-CCA2 secure KEM
revised scheme HQC- beta
HQC cryptosystem
s-DQCSD problem
s-decision quasi-cyclic syndrome decoding
plaintext attack
seIMC: A GSW-Based Secure and Efficient Integer Matrix Computation Scheme With Implementation
期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 98383-98394
作者:
Bai, Yanan
;
Shi, Xiaoyu
;
Wu, Wenyuan
;
Chen, Jingwei
;
Feng, Yong
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/08/24
Encryption
Data privacy
Cloud computing
Lattices
Machine learning
Computational efficiency
Homomorphic encryption
matrix computation
machine learning
GSW encryption scheme
big data
privacy protection
Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments
期刊论文
IEEE Access, 2019, 卷号: 7, 页码: 49232-49239
作者:
Wu, Tsu-Yang
;
Chen, Chien-Ming
;
Wang, King-Hang
;
Wu, Jimmy Ming-Tai
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/11
©版权所有 ©2017 CSpace - Powered by
CSpace