×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [15]
北京航空航天大学 [9]
山东大学 [6]
暨南大学 [5]
湖南大学 [4]
兰州理工大学 [2]
更多...
内容类型
会议论文 [56]
发表日期
2021 [1]
2019 [4]
2018 [2]
2017 [2]
2016 [3]
2015 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共56条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Research on attribute-based encryption access control technology in edge computing environment
会议论文
Beijing, China, October 22-24, 2021
作者:
Jiang YH(蒋一恒)
;
Zhang Chen
;
Zhang BW(张博文)(2.3)
;
Yuan DC(袁德成)
;
Wang C(王晨)
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/04/23
access control
attribute-based encryption
edge computing
edge nodes
information security
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
会议论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019-11-10
作者:
Zhang, Xiao
;
Wu, Faguo
;
Yao, Wang
;
Wang, Zhao
;
Wang, Wenhua
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
ciphertext-policy attribute-based encryption
multi-authority attribute-based encryption
threshold access policy
user revocation
An improved scheme for outsourced computation with attribute-based encryption
会议论文
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), DEC 13-15, 2017
作者:
Yang, Haining
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/31
blind verifiability
cloud computing
KP-ABE
verifiable computation
Fully secure decentralized ciphertext-policy attribute-based encryption in standard model
会议论文
14th International Conference on Information Security and Cryptology, Inscrypt 2018, December 14, 2018 - December 17, 2018
作者:
Ma, Chuangui
;
Ge, Aijun
;
Zhang, Jie
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/31
An efficient and anonymous KP-ABE scheme with keyword search
会议论文
Kowloon, Hong kong, June 25, 2018 - June 27, 2018
作者:
Feng, Tao
;
Yin, Xiaoyu
;
Liu, Chunyan
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Search engines
Approximate greatest common divisors
Cloud storage systems
Cloud storages
Ho-momorphic encryptions
Identity authentication
KP-ABE
PEKS
Privacy preserving
Multi-Authority Attribute-Based Encryption Access Control Scheme in Wireless Body Area Network
会议论文
3rd International Conference on Information Systems Engineering (ICISE), Shanghai, PEOPLES R CHINA, MAY 04-06, 2018
作者:
Xiao, Min*
;
Hu, Xiaoyong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/04
WBAN
Multi-Authority
CP-ABE
Access Control
Cloud Storage
An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices
会议论文
LECTURE NOTES IN REAL-TIME INTELLIGENT SYSTEMS (RTIS 2016), 2018-01-01
作者:
Liu, Lihua
;
Wang, Shangping
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/20
Attribute-based encryption
Key-policy
Linear secret sharing scheme
Lattices
Confidentiality-Preserving Publicly Verifiable Computation
会议论文
10th International Conference on Provable Security (ProvSec), Nanjing Univ Finance & Econ, Nanjing, PEOPLES R CHINA, 2017-09-01
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Attribute-based encryption
confidentiality-preserving publicly verifiable computation
delegatable outsourcing computation
public verification
Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption
会议论文
9th International Symposium on Cyberspace Safety and Security, CSS 2017, Xi'an, China, 2017-10-23
作者:
Li, Dawei
;
Chen, Jie
;
Liu, Jianwei
;
Wu, Qianhong
;
Liu, Weiran
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
会议论文
Theo. & Appl. Mod. Comput
作者:
Tian Y(田园)
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/09
©版权所有 ©2017 CSpace - Powered by
CSpace