CORC

浏览/检索结果: 共9条,第1-9条 帮助

已选(0)清除 条数/页:   排序方式:
Efficient privacy-preserved data query over ciphertext in cloud computing 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2014, 卷号: 7, 期号: 6
作者:  Song, Wei;  Peng, Zhiyong;  Wang, Qian;  Cheng, Fangquan;  Wu, Xiaoxin
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
A time-based group key management algorithm based on proxy re-encryption for cloud storage 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 卷号: 8709 LNCS
作者:  Song, Wei;  Peng, Zhiyong;  Ding, Luxiao;  Cui, Yihui;  Cheng, Fangquan
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Highly Efficient Indexing for Privacy-Preserving Multi-keyword Query over Encrypted Cloud Data 会议论文
作者:  Wang, Qian;  Cheng, Fangquan;  Peng, Zhiyong;  Zhang, Qianwen
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Highly efficient indexing for privacy-preserving multi-keyword query over encrypted cloud data 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 卷号: 8485 LNCS
作者:  Zhang, Qianwen;  Peng, Zhiyong;  Cheng, Fangquan;  Wang, Qian
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage 会议论文
作者:  Cui, Yihui;  Peng, Zhiyong;  Song, Wei;  Li, Xiaojuan;  Cheng, Fangquan
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
A privacy policy conflict detection method for multi-owner privacy data protection 期刊论文
ELECTRONIC COMMERCE RESEARCH, 2011, 卷号: 11, 期号: 1
作者:  Ren, Yi;  Cheng, Fangquan;  Peng, Zhiyong;  Huang, Xiaoting;  Song, Wei
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Resource search in peer-to-peer network based on power law distribution 期刊论文
NSWCTC 2010 - The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010, 卷号: 1
作者:  Chen, Yiting;  Hu, Wenbin;  Song, Wei;  Wang, Chuanjian;  Zeng, Xi
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
A Privacy Policy Conflict Detection Method based on Sub-graph Isomorphism 会议论文
作者:  Ren, Yi;  Peng, Zhiyong;  Cheng, Fangquan;  Guo, Sipei
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
A privacy policy conflict detection method based on sub-graph isomorphism 期刊论文
1st International Conference on Multimedia Information Networking and Security, MINES 2009, 2009, 卷号: 1
作者:  Ren, Yi;  Peng, Zhiyong;  Cheng, Fangquan;  Guo, Sipei
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace