×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [4]
西安交通大学 [1]
软件研究所 [1]
内容类型
期刊论文 [4]
会议论文 [2]
发表日期
2022 [1]
2021 [1]
2019 [1]
2017 [1]
2016 [1]
2011 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共6条,第1-6条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:
Feng, Tao
;
Yang, Pu
;
Liu, Chunyan
;
Fang, Junli
;
Ma, Rong
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/21
Cloud security
Data privacy
Industrial research
Network security
Block-chain
Cloud service providers
Data availability
Data privacy protections
Data Sharing
Privacy protection
Protection schemes
Semitrusted
Sharing schemes
Zero-knowledge proofs
Blockchain data privacy access control based on searchable attribute encryption
期刊论文
Computers, Materials and Continua, 2021, 卷号: 66, 期号: 1, 页码: 871-884
作者:
Feng, Tao
;
Pei, Hongmei
;
Ma, Rong
;
Tian, Youliang
;
Feng, Xiaoqin
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Access control
Blockchain
Predictive analytics
Privacy by designAccess structure
Authorized users
Data privacy protections
Exposure problem
Hierarchical attributes
Prediction model
Searchable encryptions
Transaction information
Algorithm of blockchain data provenance based on ABE
期刊论文
Tongxin Xuebao/Journal on Communications, 2019, 卷号: 40, 期号: 11, 页码: 101-111
作者:
Tian, Youliang
;
Yang, Kedi
;
Wang, Zuan
;
Feng, Tao
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Blockchain
Data privacy
Data Sharing
Information dissemination
Visibility
Attribute-based encryptions
Data provenance
Dynamic protections
Experimental simulations
Ho-momorphic encryptions
Privacy protection
Traceability information
Zero knowledge proof
A Sensitive Information Protection Scheme in Named Data Networking Using Attribute-Based Ring-Signcryption
会议论文
Shenzhen, China, June 26, 2017 - June 29, 2017
作者:
Feng, Tao
;
Liu, Ningning
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/15
Computers
Network security
Adaptive chosen-ciphertext securities
Future internet architecture
Multi authorities
Named data networkings
Random Oracle model
Security mechanism
Sensitive information protections
Sensitive informations
Data fusion privacy preserving algorithm based on failure nodes in wireless sensor networks
期刊论文
International Journal of Simulation: Systems, Science and Technology, 2016, 卷号: 17, 页码: 38.1-38.7
作者:
Sun, Zeyu
;
Hou, Xiaojing
;
Li, Xuelun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/26
Data privacy protections
Fusion technology
Neighboring nodes
Normal operations
Pre distributions
Privacy preserving
Privacy protection
Wireless sensor network (WSNs)
polye+ctr: a swiss-army-knife mode for block ciphers
会议论文
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Zhang Liting
;
Wu Wenling
;
Wang Peng
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2011/10/10
Authentication
Lyapunov methods
©版权所有 ©2017 CSpace - Powered by
CSpace