×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [12]
北京大学 [6]
湖南大学 [6]
北京航空航天大学 [5]
山东大学 [4]
安徽大学 [2]
更多...
内容类型
期刊论文 [41]
会议论文 [9]
其他 [5]
发表日期
2022 [2]
2019 [5]
2018 [15]
2017 [12]
2016 [7]
2015 [4]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共55条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A location privacy protection method based on cipher-text retrieval in cloud environment
期刊论文
SECURITY AND PRIVACY, 2022
作者:
Zhang, Yongbing
;
Zhang, Qiuyu
;
Jiang, Yilong
;
Yan, Yan
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/07/19
cipher-text retrieval
location privacy protection
location-based service
Morton code
top-k sorting
A non-interactive verifiable computation model of perceptual layer data based on CP-ABE
会议论文
Guangzhou, China, January 14-16, 2022
作者:
Zhao JM(赵剑明)
;
Miao, Weiwei
;
Zeng, Zeng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/13
CP-ABE
non-interactive verifiable computation
NPOT
Privacy preserving weighted similarity search scheme for encrypted data
期刊论文
IET INFORMATION SECURITY, 2019, 卷号: 13, 页码: 61-69
作者:
Guo, Cheng
;
Tian, Pengxu
;
Chang, Chin-Chen
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/02
cryptography
outsourcing
cloud computing
data privacy
different weighted searches
encrypted data
searchable symmetric encryption
data users
search request
homomorphic encryption
weight problem
weight information
weighted similarity search scheme
cloud computing
outsourced data
privacy concerns
searchable encryption
different users
different requirements
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 卷号: 131, 页码: 55-65
作者:
Zhao, Minghao
;
Hu, Chengyu
;
Song, Xiangfu
;
Zhao, Chuan
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Cloud computing security
Outsourced computing
Verifiability
Privacy
Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 页码: 3511-3528
作者:
Wu, Faguo
;
Yao, Wang
;
Zhang, Xiao
;
Zheng, Zhiming
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
Identity-based signature
Multimedia Social Networks
Revocation
Outsourced computation
Lattice-based
A Secure and Efficient Location-based Service Scheme for Smart Transportation
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 卷号: 92, 页码: 694-704
作者:
Lin, Jiaping
;
Niu, Jianwei
;
Li, Hui
;
Atiquzzaman, Mohammed
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Location-based Service (LBS)
Privacy preserving
Outsourced cloud
Internet-of-Things (IoT)
An improved scheme for outsourced computation with attribute-based encryption
会议论文
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), DEC 13-15, 2017
作者:
Yang, Haining
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/31
blind verifiability
cloud computing
KP-ABE
verifiable computation
ESI计算机科学热点论文推送2018年第3期
其他
2018-07-01
作者:
张桂英
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2018/08/01
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud
期刊论文
2018, 卷号: 112, 页码: 97-107
作者:
Xiang, Tao[1]
;
Li, Xiaoguo[1]
;
Chen, Fei[2]
;
Yang, Yuanyuan[3]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/28
PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data
期刊论文
IEEE Access, 2018, 卷号: 6, 页码: 31541-31552
作者:
Zhang, Qiang
;
Liu, Qin
;
Wang, Guojun*
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/03
Searchable encryption
cloud computing
personalized search
privacy-preserving
the law of universal gravitation
©版权所有 ©2017 CSpace - Powered by
CSpace