CORC

浏览/检索结果: 共46条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A non-interactive verifiable computation model of perceptual layer data based on CP-ABE 会议论文
Guangzhou, China, January 14-16, 2022
作者:  Zhao JM(赵剑明);  Miao, Weiwei;  Zeng, Zeng
收藏  |  浏览/下载:13/0  |  提交时间:2022/04/13
Privacy preserving weighted similarity search scheme for encrypted data 期刊论文
IET INFORMATION SECURITY, 2019, 卷号: 13, 页码: 61-69
作者:  Guo, Cheng;  Tian, Pengxu;  Chang, Chin-Chen
收藏  |  浏览/下载:17/0  |  提交时间:2019/12/02
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial 期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 卷号: 131, 页码: 55-65
作者:  Zhao, Minghao;  Hu, Chengyu;  Song, Xiangfu;  Zhao, Chuan
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/11
Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 页码: 3511-3528
作者:  Wu, Faguo;  Yao, Wang;  Zhang, Xiao;  Zheng, Zhiming
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
An improved scheme for outsourced computation with attribute-based encryption 会议论文
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), DEC 13-15, 2017
作者:  Yang, Haining;  Sun, Jiameng;  Qin, Jing
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/31
ESI计算机科学热点论文推送2018年第3期 其他
2018-07-01
作者:  张桂英
收藏  |  浏览/下载:23/0  |  提交时间:2018/08/01
PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data 期刊论文
IEEE Access, 2018, 卷号: 6, 页码: 31541-31552
作者:  Zhang, Qiang;  Liu, Qin;  Wang, Guojun*
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/03
Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 63624-63634
作者:  Yang, Dan;  Chen, Yu-Chi;  Ye, Shaozhen;  Tso, Raylin
收藏  |  浏览/下载:4/0  |  提交时间:2019/11/21
Verifiable outsourced attribute-based signature scheme 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 页码: 18105-18115
作者:  Ren, Yanli[1];  Jiang, Tiejin[2]
收藏  |  浏览/下载:13/0  |  提交时间:2019/04/22
Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud 期刊论文
Wireless Communications and Mobile Computing, 2018, 卷号: Vol.2018
作者:  Qi Li;  Tao Zhang;  Hongbo Zhu;  Zuobin Ying
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/22


©版权所有 ©2017 CSpace - Powered by CSpace