×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [9]
内容类型
期刊论文 [6]
会议论文 [3]
发表日期
2014 [5]
2011 [1]
2010 [1]
2009 [2]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Efficient privacy-preserved data query over ciphertext in cloud computing
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2014, 卷号: 7, 期号: 6
作者:
Song, Wei
;
Peng, Zhiyong
;
Wang, Qian
;
Cheng, Fangquan
;
Wu, Xiaoxin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
cloud computing
privacy-preserved data query
service-oriented query
two stage index
A time-based group key management algorithm based on proxy re-encryption for cloud storage
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 卷号: 8709 LNCS
作者:
Song, Wei
;
Peng, Zhiyong
;
Ding, Luxiao
;
Cui, Yihui
;
Cheng, Fangquan
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data
会议论文
作者:
Wang, Qian
;
Cheng, Fangquan
;
Peng, Zhiyong
;
Zhang, Qianwen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Highly efficient indexing for privacy-preserving multi-keyword query over encrypted cloud data
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 卷号: 8485 LNCS
作者:
Zhang, Qianwen
;
Peng, Zhiyong
;
Cheng, Fangquan
;
Wang, Qian
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage
会议论文
作者:
Cui, Yihui
;
Peng, Zhiyong
;
Song, Wei
;
Li, Xiaojuan
;
Cheng, Fangquan
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/05
cryptographic cloud storage
proxy re-encryption
group key management
A privacy policy conflict detection method for multi-owner privacy data protection
期刊论文
ELECTRONIC COMMERCE RESEARCH, 2011, 卷号: 11, 期号: 1
作者:
Ren, Yi
;
Cheng, Fangquan
;
Peng, Zhiyong
;
Huang, Xiaoting
;
Song, Wei
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/05
Conflict detection
Sub-graph isomorphism
Multi-owner privacy data protection
Deputy mechanism
Resource search in peer-to-peer network based on power law distribution
期刊论文
NSWCTC 2010 - The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010, 卷号: 1
作者:
Chen, Yiting
;
Hu, Wenbin
;
Song, Wei
;
Wang, Chuanjian
;
Zeng, Xi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
A Privacy Policy Conflict Detection Method based on Sub-graph Isomorphism
会议论文
作者:
Ren, Yi
;
Peng, Zhiyong
;
Cheng, Fangquan
;
Guo, Sipei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
conflict detection
sub-graph isomorphism
privacy database
A privacy policy conflict detection method based on sub-graph isomorphism
期刊论文
1st International Conference on Multimedia Information Networking and Security, MINES 2009, 2009, 卷号: 1
作者:
Ren, Yi
;
Peng, Zhiyong
;
Cheng, Fangquan
;
Guo, Sipei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
©版权所有 ©2017 CSpace - Powered by
CSpace