×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [15]
内容类型
期刊论文 [11]
会议论文 [4]
发表日期
2019 [8]
2018 [2]
2017 [3]
2011 [2]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A Secure Data Sharing Scheme with Designated Server (Open Access)
期刊论文
Security and Communication Networks, 2019, 卷号: 2019
作者:
Zhu, Binrui
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
A secure and efficient data sharing and searching scheme in wireless sensor networks (Open Access)
期刊论文
Sensors (Switzerland), 2019, 卷号: 19, 期号: 11
作者:
Zhu, Binrui
;
Susilo, Willy
;
Qin, Jing
;
Guo, Fuchun
;
Zhao, Zhen
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/11
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2019
作者:
Shen, Wenting
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/11
Fuzzy matching: multi-authority attribute searchable encryption without central authority
期刊论文
SOFT COMPUTING, 2019, 卷号: 23, 期号: 2, 页码: 527-536
作者:
Zhu, Binrui
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/11
Multi-authority
Cloud computing
Searchable encryption
Attribute-based
encryption
Fuzzy identity
Privacy-preserving and publicly verifiable protocol for outsourcing polynomials evaluation to a malicious cloud
期刊论文
International Journal of Digital Crime and Forensics, 2019, 卷号: 11, 期号: 4, 页码: 14-27
作者:
Xie, Dawei
;
Yang, Haining
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
Blind verification
Cloud computing
Large polynomials
Privacy
Publicly verifiable
A Secure Data Sharing Scheme with Designated Server
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2019
作者:
Zhu, Binrui
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks
期刊论文
SENSORS, 2019, 卷号: 19, 期号: 11
作者:
Zhu, Binrui
;
Susilo, Willy
;
Qin, Jing
;
Guo, Fuchun
;
Zhao, Zhen
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/11
wireless sensor networks
cloud computing
Internet of Things
public
key encryption with keyword search
off-line keyword guessing attack
on-line keyword guessing attack
An improved scheme for outsourced computation with attribute-based encryption
会议论文
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), DEC 13-15, 2017
作者:
Yang, Haining
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/31
blind verifiability
cloud computing
KP-ABE
verifiable computation
The Public Verifiability of Public Key Encryption with Keyword Search
期刊论文
MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 卷号: 235, 页码: 299-312
作者:
Zhu, Binrui
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/11
Cloud computing
PEKS
Public verifiability
Indistinguishability
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2018
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Ma, Jixin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
©版权所有 ©2017 CSpace - Powered by
CSpace