×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [6]
北京大学 [4]
重庆大学 [3]
数学与系统科学研究院 [3]
清华大学 [1]
厦门大学 [1]
更多...
内容类型
期刊论文 [12]
会议论文 [3]
其他 [2]
学位论文 [2]
发表日期
2019 [1]
2018 [3]
2017 [1]
2016 [1]
2012 [2]
2011 [3]
更多...
学科主题
Computer S... [1]
计算机科学技术基础学... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共19条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The Optimal Sub-Packetization of Linear Capacity-Achieving PIR Schemes With Colluding Servers
期刊论文
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 卷号: 65, 期号: 5, 页码: 2723-2735
作者:
Zhang, Zhifang
;
Xu, Jingke
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2020/01/10
Private information retrieval
capacity
sub-packetization
On sub-packetization and access number of capacity-achieving PIR schemes for MDS coded non-colluding servers
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 卷号: 61, 期号: 10, 页码: 16
作者:
Xu, Jingke
;
Zhang, Zhifang
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2018/11/16
private information retrieval
sub-packetization
access number
distributed storage
MDS code
Private Information Retrieval from MDS Coded Data With Colluding Servers: Settling a Conjecture by Freij-Hollanti et al.
期刊论文
IEEE Transactions on Information Theory, 2018, 卷号: Vol.64 No.2, 页码: 1000-1022
作者:
HuaSun
;
SyedAliJafar
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/24
Servers
Privacy
Information
retrieval
Indexes
Sun
Electrical
engineering
Electronic
mail
Capacity
private
information
retrieval
colluding
servers
MDS
coded
data
On sub-packetization and access number of capacity-achieving PIR schemes for MDS coded non-colluding servers
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 卷号: 61, 期号: 10
作者:
Xu, Jingke
;
Zhang, Zhifang
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/31
An Absolute Secure Wire-Line Communication Method Against Wiretapper
期刊论文
IEEE COMMUNICATIONS LETTERS, 2017
Liu, Sanjun
;
Ma, Meng
;
Li, Yunzhou
;
Chen, Yingyang
;
Jiao, Bingli
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Physical layer security
artificial noise
full duplex
absolute security
PHYSICAL LAYER SECURITY
ARTIFICIAL NOISE
CHANNEL
Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016
Yang, Zhi
;
Xue, Jilong
;
Yang, Xiaoyong
;
Wang, Xiao
;
Dai, Yafei
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2017/12/04
Online social network
Sybil attack
Sybil detection
spam
an attribute based encryption scheme with fine-grained attribute revocation
会议论文
2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, United states, December 3, 2012 - December 7, 2012
Li Qiang
;
Feng Dengguo
;
Zhang Liwu
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2013/09/22
Access control
Communication
single hop detection of node clone attacks in mobile wireless sensor networks
会议论文
2012 International Workshop on Information and Electronics Engineering, IWIEE 2012, Harbin, China, March 10, 2012 - March 11, 2012
Lou Yanxiang
;
Zhang Yong
;
Liu Shengli
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2013/09/22
Cloning
Electronics engineering
Network security
股权集中、控制权配置与公司非效率投资行为——兼论大股东的监督抑或合谋? Ownership concentration, allocation of control rights and inefficient investment in firms :Monitoring or colluding among multiple large shareholders?
期刊论文
2011, 卷号: 14, 页码: 81-96
作者:
窦炜[1,2]
;
刘星[1]
;
安灵[3]
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/28
collusion attack on a self-healing key distribution with revocation in wireless sensor networks
会议论文
11th International Workshop on Information Security Applications, WISA 2010, Jeju Island, Korea, Republic of, August 24,
Bao Kehua
;
Zhang Zhenfeng
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2011/10/10
Security of data
Sensor networks
©版权所有 ©2017 CSpace - Powered by
CSpace