×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [5]
西安交通大学 [2]
内容类型
期刊论文 [4]
会议论文 [3]
发表日期
2021 [1]
2019 [2]
2018 [1]
2015 [2]
2013 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共7条,第1-7条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
BCP-based joint delegation learning model and protocol
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 5, 页码: 137-148
作者:
Gao, Sheng
;
Xiang, Kang
;
Tian, Youliang
;
Tan, Weijie
;
Feng, Tao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/02/17
Crime
Cryptography
Data mining
Decision trees
Privacy by design
Random forests
Data mining process
Decision tree modeling
Entropy algorithms
Ho-momorphic encryptions
Horizontal distribution
Model construction
Performance analysis
Privacy protection
Algorithm of blockchain data provenance based on ABE
期刊论文
Tongxin Xuebao/Journal on Communications, 2019, 卷号: 40, 期号: 11, 页码: 101-111
作者:
Tian, Youliang
;
Yang, Kedi
;
Wang, Zuan
;
Feng, Tao
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Blockchain
Data privacy
Data Sharing
Information dissemination
Visibility
Attribute-based encryptions
Data provenance
Dynamic protections
Experimental simulations
Ho-momorphic encryptions
Privacy protection
Traceability information
Zero knowledge proof
An efficient and anonymous KP-ABE scheme with keyword search
会议论文
Kowloon, Hong kong, June 25, 2018 - June 27, 2018
作者:
Feng, Tao
;
Yin, Xiaoyu
;
Liu, Chunyan
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Search engines
Approximate greatest common divisors
Cloud storage systems
Cloud storages
Ho-momorphic encryptions
Identity authentication
KP-ABE
PEKS
Privacy preserving
Privacy-aware transmission scheme based on homomorphic proxy re-encryption for NDN
期刊论文
International Journal of Security and Networks, 2018, 卷号: 13, 期号: 1, 页码: 58-70
作者:
Guo, Xian
;
Chen, Cheng
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Cao, Lai-Cheng
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Data privacy
Network security
Content-centric networkings
Ho-momorphic encryptions
Named data networkings
Privacy protection
Proxy re encryptions
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
期刊论文
Tongxin Xuebao/Journal on Communications, 2015, 卷号: 36, 期号: [db:dc_citation_issue]
作者:
Yang, Pan
;
Gui, Xiao-Lin
;
Yao, Jing
;
Lin, Jian-Cai
;
Tian, Feng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/02
Computing services
Ho-momorphic encryptions
Ideal lattice
Privacy preserving
Representative
Secure data aggregation with privacy-protection in smart grid
会议论文
Shanghai, China, December 27, 2014 - December 28, 2014
作者:
Liu, Xueyan
;
Zhang, Qiang
;
Li, Zhanming
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2020/11/15
Cryptography
Data privacy
Electric power transmission networks
Energy resources
Fault detection
Home networks
Communication cost
Computation overheads
Fault-detection mechanisms
Ho-momorphic encryptions
Parameter analysis
Privacy preserving
Privacy protection
Secure data aggregations
A hybrid approach for privacy-preserving processing of KNN queries in mobile database systems
会议论文
作者:
Tian, Shixin
;
Cai, Ying
;
Zheng, Qinghua
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/10
Cloaking region
Computation intensives
Ho-momorphic encryptions
K-NN query
Location privacy
Mobile database systems
Secure multi-party computation
Spatial relationships
©版权所有 ©2017 CSpace - Powered by
CSpace