×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [9]
内容类型
期刊论文 [6]
会议论文 [3]
发表日期
2021 [3]
2020 [2]
2018 [1]
2015 [2]
2008 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
BCP-based joint delegation learning model and protocol
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 5, 页码: 137-148
作者:
Gao, Sheng
;
Xiang, Kang
;
Tian, Youliang
;
Tan, Weijie
;
Feng, Tao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/02/17
Crime
Cryptography
Data mining
Decision trees
Privacy by design
Random forests
Data mining process
Decision tree modeling
Entropy algorithms
Ho-momorphic encryptions
Horizontal distribution
Model construction
Performance analysis
Privacy protection
A weighted K-member clustering algorithm for K-anonymization
期刊论文
COMPUTING, 2021, 卷号: 103, 期号: 10, 页码: -
作者:
Yan, Yan
;
Herman, Eyeleko Anselme
;
Mahmood, Adnan
;
Feng, Tao
;
Xie, Pengshou
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2021/03/12
Privacy by design
Publishing
Statistics
Clustering effect
Clustering process
Data release
Experimental analysis
Information loss
K-Anonymity
K-anonymization
Privacy Preserving Data Publishing
Secure Data Collaborative Computing Scheme Based on Blockchain
期刊论文
Security and Communication Networks, 2021, 卷号: 2021
作者:
Feng, Tao
;
Wang, Xusheng
;
Liu, Chunyan
;
Fang, Junli
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2021/03/02
Blockchain
Digital storage
Electronic voting
Privacy by design
Anti collusions
Bloom filters
Data informations
Data storage
Secret sharing
Secure multi-party computation
Security datum
Verifiability
Biohashing encrypted speech retrieval based on chaotic measurement matrix
期刊论文
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2020, 卷号: 48, 期号: 12, 页码: 32-37
作者:
Huang, Yibo
;
Wang, Yong
;
Zhang, Qiuyu
;
Chen, Tengfei
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/02/17
Biometrics
Cryptography
Information retrieval
Privacy by design
Search engines
BioHashing
Biometric template
Chaotic measurements
Data leakage
Encrypted speech
Security and privacy
Speech features
Speech retrieval
An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing
期刊论文
Turkish Journal of Electrical Engineering and Computer Sciences, 2020, 卷号: 28, 期号: 5, 页码: 2467-2482
作者:
Zhang, Qiuyu
;
Zhang, Denghai
;
Zhou, Liang
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/02/18
Authentication
Cloud computing
Cryptography
Hamming distance
Privacy by design
LBS privacy protection technology based on searchable encryption mechanism
会议论文
Beijing, China, May 25, 2018 - May 27, 2018
作者:
Feng, Tao
;
Wang, Xudong
;
Li, Xinghua
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Cryptography
Global positioning system
Information services
Location
Manufacture
Search engines
Telecommunication services
Wireless sensor networks
Location privacy protection
Mobile communication networks
Mobile intelligent terminals
Positioning technologies
Privacy protection model
Search information
Searchable encryptions
Security properties
Secure Network Coding-Based Named Data Network Mutual Anonymity communication Protocol
会议论文
作者:
Feng Tao
;
Xing Fei
;
Lu Ye
;
Fang Jun Li
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/15
NDN
mutual anonymity
anonymous routing
network coding
authentication mechanism
Research on Cloud-Based LBS and Location Privacy Protection
会议论文
作者:
Yan, Yan
;
Wang, Wan Jun
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/11/15
Mobile Cloud Computing
Location-Based Services
Location privacy
Confidentiality
Completeness
The universally composable security authentication and key exchange protocol for mobile satellite communication systems
期刊论文
Yuhang Xuebao/Journal of Astronautics, 2008, 卷号: 29, 期号: 6, 页码: 1959-1964
作者:
Feng, Tao
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Authentication
Cryptography
Flowcharting
Network security
Satellites
Authentication and key exchange
Forward-secure
Mobile satellite communication system (MSCS)
Mobile satellite communication systems
Network control centers
Pseudo-random functions
Universally composable
Universally Composable Security
©版权所有 ©2017 CSpace - Powered by
CSpace