CORC

浏览/检索结果: 共19条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
The Optimal Sub-Packetization of Linear Capacity-Achieving PIR Schemes With Colluding Servers 期刊论文
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 卷号: 65, 期号: 5, 页码: 2723-2735
作者:  Zhang, Zhifang;  Xu, Jingke
收藏  |  浏览/下载:32/0  |  提交时间:2020/01/10
On sub-packetization and access number of capacity-achieving PIR schemes for MDS coded non-colluding servers 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 卷号: 61, 期号: 10, 页码: 16
作者:  Xu, Jingke;  Zhang, Zhifang
收藏  |  浏览/下载:38/0  |  提交时间:2018/11/16
Private Information Retrieval from MDS Coded Data With Colluding Servers: Settling a Conjecture by Freij-Hollanti et al. 期刊论文
IEEE Transactions on Information Theory, 2018, 卷号: Vol.64 No.2, 页码: 1000-1022
作者:  HuaSun;  SyedAliJafar
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/24
On sub-packetization and access number of capacity-achieving PIR schemes for MDS coded non-colluding servers 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 卷号: 61, 期号: 10
作者:  Xu, Jingke;  Zhang, Zhifang
收藏  |  浏览/下载:13/0  |  提交时间:2019/12/31
An Absolute Secure Wire-Line Communication Method Against Wiretapper 期刊论文
IEEE COMMUNICATIONS LETTERS, 2017
Liu, Sanjun; Ma, Meng; Li, Yunzhou; Chen, Yingyang; Jiao, Bingli
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Vote Trust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016
Yang, Zhi; Xue, Jilong; Yang, Xiaoyong; Wang, Xiao; Dai, Yafei
收藏  |  浏览/下载:8/0  |  提交时间:2017/12/04
an attribute based encryption scheme with fine-grained attribute revocation 会议论文
2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, United states, December 3, 2012 - December 7, 2012
Li Qiang; Feng Dengguo; Zhang Liwu
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22
single hop detection of node clone attacks in mobile wireless sensor networks 会议论文
2012 International Workshop on Information and Electronics Engineering, IWIEE 2012, Harbin, China, March 10, 2012 - March 11, 2012
Lou Yanxiang; Zhang Yong; Liu Shengli
收藏  |  浏览/下载:18/0  |  提交时间:2013/09/22
股权集中、控制权配置与公司非效率投资行为——兼论大股东的监督抑或合谋? Ownership concentration, allocation of control rights and inefficient investment in firms :Monitoring or colluding among multiple large shareholders? 期刊论文
2011, 卷号: 14, 页码: 81-96
作者:  窦炜[1,2];  刘星[1];  安灵[3]
收藏  |  浏览/下载:10/0  |  提交时间:2019/11/28
collusion attack on a self-healing key distribution with revocation in wireless sensor networks 会议论文
11th International Workshop on Information Security Applications, WISA 2010, Jeju Island, Korea, Republic of, August 24,
Bao Kehua; Zhang Zhenfeng
收藏  |  浏览/下载:9/0  |  提交时间:2011/10/10


©版权所有 ©2017 CSpace - Powered by CSpace