×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [2]
兰州理工大学 [1]
西安交通大学 [1]
内容类型
期刊论文 [3]
会议论文 [1]
发表日期
2018 [4]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共4条,第1-4条
帮助
限定条件
发表日期:2018
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
User privacy-preserving cloud storage scheme on CP-ABE
期刊论文
Qinghua Daxue Xuebao/Journal of Tsinghua University, 2018, 卷号: 58, 期号: 2, 页码: 150-156
作者:
Cao, Laicheng
;
Liu, Yufei
;
Dong, Xiaoye
;
Guo, Xian
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Digital storage
Security of data
Attribute-based encryptions
Cloud storages
Distributed proxies
Privacy preserving
Searchable encryptions
Attribute-based encryption supporting data filtration over post-quantum assumptions
期刊论文
International Journal of Electronic Security and Digital Forensics, 2018, 卷号: 10, 页码: 323-337
作者:
Jiao, Chunhong
;
Xiang, Xinyin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/19
Attribute based encryption (ABE)
Attribute-based encryptions
Authentication information
Chosen-plaintext attack
Cryptographic primitives
Data filtration
Efficient construction
Post quantum
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10726 LNCS, 页码: 278-298
作者:
Feng, H.
;
Liu, J.
;
Wu, Q.
;
Liu, W.
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
Access control
Cloud computing
Digital storage
Public key cryptography
Security of data
Attribute-based
Cloud computing securities
Encrypted data
Fine grained
Fully homomorphic encryption
Generic construction
Key encapsulation mechanisms
Predicate encryptions
Cryptography
RWAC: A Self-contained Read and Write Access Control Scheme for Group Collaboration
会议论文
Proceedings - IEEE Symposium on Computers and Communications
作者:
Wang, J.
;
Lang, B.
;
Zhu, R.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Cryptography
Digital devices
Digital storage
Access control models
Attribute-based encryptions
Ciphertext-policy attribute-based encryptions
Group collaboration
Group signatures
Personal digital devices
Read and write access control
Signature generation
Access control
©版权所有 ©2017 CSpace - Powered by
CSpace