×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [21]
武汉大学 [8]
北京航空航天大学 [6]
西安理工大学 [5]
北京大学 [4]
兰州理工大学 [2]
更多...
内容类型
期刊论文 [45]
会议论文 [14]
其他 [3]
发表日期
2019 [3]
2018 [1]
2017 [3]
2016 [5]
2015 [3]
2014 [3]
更多...
学科主题
Computer S... [1]
Engineerin... [1]
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共62条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Research on secure routing technology based on NDN for VANET
会议论文
Hong Kong, Hong kong, June 1, 2019 - June 3, 2019
作者:
Gai, Xiaowei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/11/15
Cryptography
Distributed computer systems
Dynamics
Floods
Memory architecture
Mobile security
Mobile telecommunication systems
Network architecture
Network routing
Signal processing
Transmission control protocol
Vehicular ad hoc networks
Data network
Forward-secure
Identity based cryptography
Named data networkings
Network environments
Security requirements
Trust values
Wireless mobile networks
Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 页码: 878-890
作者:
Zhang, Jie
;
Huang, Xin
;
Wang, Wei
;
Yue, Yong
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/11/19
Authenticated key exchange (AKE)
unbalanced computational requirements
identity-based (ID-based) cryptography
disaster scenarios
pairing-free
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession
期刊论文
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 卷号: 12, 期号: 5
作者:
Wang, Huaqun
;
He, Debiao
;
Yu, Jia
;
Wang, Zhiwei
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/05
Protocols
Cloud computing
Concrete
Privacy
Public key cryptography
Servers
Cloud computing
provable data possession
identity-based cryptography
incentive
anonymity
Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control
期刊论文
2018, 卷号: 12, 页码: 141-149
作者:
Wang, Shangping
;
Zhang, Xia
;
Zhang, Yaling
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/20
cryptography
authorisation
learning (artificial intelligence)
trees (mathematics)
lattice theory
revocable-and-grantable attribute-based encryption
RABE scheme
fine-grained access control
identity-based encryption
data security
binary tree technique
attribute revocation
attribute granting
learning-with-errors assumption
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
期刊论文
Sensors (Basel), 2017, 卷号: Vol.17 No.6
作者:
Wang C
;
Yuan Y
;
Wu J.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/03/04
authenticated key establishment
blind signature
elliptic curve cryptography
handover authentication
identity-based signature
wireless networks
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
期刊论文
INFORMATION SCIENCES, 2017, 卷号: 375
作者:
He, Debiao
;
Wang, Huaqun
;
Zhang, Jianhong
;
Wang, Lina
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Public auditing
Identity-based cryptography
Provable security
Bilinear pairing
Identity Based Generalized Signcryption Scheme in the Standard Model
期刊论文
2017, 卷号: 19
作者:
Shen, Xiaoqin
;
Ming, Yang
;
Feng, Jie
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/20
generalized signcryption
identity based cryptography
bilinear pairings
standard model
Keyword search protocol with privacy preservation using ID-based proxy reencryption
期刊论文
International Journal of Security and Networks, 2016, 卷号: Vol.11 No.4, 页码: 188-195
作者:
Feng Shao
;
Jie Cui
;
Run-hua Shi
;
Shun Zhang
;
Hong Zhong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/22
cloud
computing
keyword
search
rank
search
privacy
preservation
identity-based
proxy
reencryption
privacy
protection
cloud
security
cryptography
user
revocation.
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
期刊论文
IET COMMUNICATIONS, 2016, 卷号: 10, 期号: 14
作者:
He, Debiao
;
Wang, Huaqun
;
Khan, Muhammad Khurram
;
Wang, Lina
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
public key cryptography
smart power grids
smart meters
power system reliability
power system security
telecommunication security
lightweight anonymous key distribution scheme
smart grid
elliptic curve cryptography
reliability
secret key distribution scheme
communication security
smart meter anonymity
identity-based cryptography
AKD scheme
mutual authentication
communication costs
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 卷号: 11, 期号: 6
作者:
Wang, Huaqun
;
He, Debiao
;
Tang, Shaohua
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/05
Cloud computing
identity-based cryptography
proxy public key cryptography
remote data integrity checking
©版权所有 ©2017 CSpace - Powered by
CSpace