×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [8]
山东大学 [3]
西安交通大学 [2]
湖南大学 [2]
北京大学 [1]
兰州理工大学 [1]
更多...
内容类型
期刊论文 [15]
会议论文 [6]
其他 [1]
发表日期
2021 [1]
2019 [1]
2018 [2]
2017 [1]
2015 [2]
2014 [2]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共22条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The New Method of Sensor Data Privacy Protection for IoT
期刊论文
SHOCK AND VIBRATION, 2021, 卷号: 2021
作者:
Wu, Yue
;
Song, Liangtu
;
Liu, Lei
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/09/06
Cadmium stable isotope variation in a mountain area impacted by acid mine drainage
期刊论文
Science of the Total Environment, 2019, 卷号: 646, 页码: 696–703
作者:
Wen-Jun Yang
;
Keng-Bo Ding
;
Peng Zhang
;
Hao Qiu
;
Christophe Cloquet
;
Han-Jie Wen
;
Jean-Louis Morel
;
Rong-Liang Qiu
;
Ye-Tao Tang
收藏
  |  
浏览/下载:262/0
  |  
提交时间:2019/06/03
Cadmium Isotope
rivers
trace Metal
source
acid Mine Drainage
Verifiable outsourced attribute-based signature scheme
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 页码: 18105-18115
作者:
Ren, Yanli[1]
;
Jiang, Tiejin[2]
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/04/22
Cloud computing
Attribute-based signature
Outsourcing algorithm
Verifiable
RWAC: A Self-contained Read and Write Access Control Scheme for Group Collaboration
会议论文
Proceedings - IEEE Symposium on Computers and Communications
作者:
Wang, J.
;
Lang, B.
;
Zhu, R.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Cryptography
Digital devices
Digital storage
Access control models
Attribute-based encryptions
Ciphertext-policy attribute-based encryptions
Group collaboration
Group signatures
Personal digital devices
Read and write access control
Signature generation
Access control
Securely outsourcing decentralized multi-authority attribute based signature
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2017, 卷号: 10581 LNCS, 页码: 86-102
作者:
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/12
Attribute based signature
Decentralization
Distributed computation
Outsourcing computation
Attribute Set Based Signature Secure in the Standard Model
期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 卷号: 9, 期号: [db:dc_citation_issue], 页码: 1516-1528
作者:
Li, Baohong
;
Zhao, Yinliang
;
Zhao, Hongping
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/02
subgroup decision assumptions
signing policy
Attribute set based signatures
dual system encryption
Fully adaptive attribute-based group signature in standard model
期刊论文
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2015, 卷号: 38, 期号: [db:dc_citation_issue], 页码: 200-207
作者:
Li, Bao Hong
;
Huang, Yi Yang
;
Zhao, Ying Liang
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/02
selected adversaries
monotone Boolean formulas
attribute-based group signatures
privacy
基于平滑投影散列函数的匿名凭证系统
期刊论文
计算机应用与软件, 2014, 期号: 10, 页码: 295-299
刘世超
;
张立武
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2014/12/16
匿名凭证
平滑投影散列函数
线性加密体制
Waters签名
Anonymous credential
Smooth projective hash function
Linear encryption
Waters signature
Verifiable multi-authority attribute based encryption scheme with different permissions
期刊论文
Journal of Chemical and Pharmaceutical Research, 2014, 卷号: 6, 期号: 7, 页码: 611-620
作者:
Liu, Xueyan
;
Li, Zhanming
;
Hao, Zhanjun
;
Zhang, Qiang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/14
Access control
Algorithms
Computation theory
Decision making
Decision theory
Granular computing
Street traffic control
Traffic congestion
Attribute-based encryptions
Identity Based Encryption
Multiple authorities
Permission
Pseudorandom functions
forgeability of wang-zhu-feng-yau's attribute-based signature with policy-and-endorsement mechanism
期刊论文
Journal of Computer Science and Technology, 2013, 卷号: 28, 期号: 4, 页码: 743-748
Ge Ai-Jun
;
Huang Xin-Yi
;
Chen Cheng
;
Ma Chuan-Gui
;
Zhang Rui
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2013/09/17
Hardware
Software engineering
©版权所有 ©2017 CSpace - Powered by
CSpace