CORC

浏览/检索结果: 共22条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof 期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:  Feng, Tao;  Yang, Pu;  Liu, Chunyan;  Fang, Junli;  Ma, Rong
收藏  |  浏览/下载:13/0  |  提交时间:2022/04/21
基于文言分析的乌台诗案前后苏轼心理变化研究——从心理语义和人格特征的角度 学位论文
中国科学院心理研究所: 中国科学院心理研究所, 2021
作者:  马锐
收藏  |  浏览/下载:56/0  |  提交时间:2022/01/25
DCAF: Dynamic Cross-Chain Anchoring Framework using Smart Contracts 期刊论文
COMPUTER JOURNAL, 2021
作者:  Wang, Weidong;  Li, Xiaofeng;  Zhao, He
收藏  |  浏览/下载:7/0  |  提交时间:2022/03/21
An alternative approach to public cloud data auditing supporting data dynamics 期刊论文
Soft Computing, 2019, 卷号: 23, 期号: 13, 页码: 4939-4953
作者:  Wang, Tao;  Yang, Bo*;  Liu, Hongyu;  Yu, Yong;  Qiu, Guoyong
收藏  |  浏览/下载:32/0  |  提交时间:2019/12/04
Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds 期刊论文
IEEE SYSTEMS JOURNAL, 2019, 卷号: 13, 期号: 2
作者:  Zhang, Mingwu;  Zhang, Yudi;  Jiang, Yan;  Shen, Jian
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks 期刊论文
Mobile Networks and Applications, 2018
作者:  Zhang, Hailong;  Guo, Shanqing;  Li, Zhen;  Liu, Pengtao;  Hu, Chengyu
收藏  |  浏览/下载:11/0  |  提交时间:2019/04/24
Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting 期刊论文
2018, 卷号: 6, 页码: 42445
作者:  Wu, D. N.[1];  Gan, Q. Q.[1];  Wang, X. M.[1]
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/13
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks 期刊论文
Mobile Networks and Applications, 2018
作者:  Hu C.;  Li Z.;  Liu P.;  Yang R.;  Guo S.
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks 期刊论文
IEEE Access, 2017, 卷号: Vol.5, 页码: 12702-12713
作者:  Xu,Yan;  Liu,Lu;  Wang,Ming;  Cui,Jie;  Franqueira,Virginia N. L.
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/22
Tell me the truth: Practically public authentication for outsourced databases with multi-user modification 期刊论文
INFORMATION SCIENCES, 2017, 卷号: 387
作者:  Song, Wei;  Wang, Bing;  Wang, Qian;  Peng, Zhiyong;  Lou, Wenjing
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace