×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [26]
湖南大学 [26]
山东大学 [25]
大连理工大学 [20]
北京航空航天大学 [17]
兰州理工大学 [11]
更多...
内容类型
期刊论文 [212]
会议论文 [21]
学位论文 [3]
其他 [2]
发表日期
2018 [238]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共238条,第1-10条
帮助
限定条件
发表日期:2018
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Reversible data hiding in encrypted image with separable capability and high embedding capacity
期刊论文
INFORMATION SCIENCES, 2018, 卷号: 465, 页码: 285-304
作者:
Qin, Chuan
;
He, Zhihong
;
Luo, Xiangyang
;
Dong, Jing
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2019/07/12
Reversible data hiding
Encrypted image
Embedding rate
Image quality
LBS privacy protection technology based on searchable encryption mechanism
会议论文
Beijing, China, May 25, 2018 - May 27, 2018
作者:
Feng, Tao
;
Wang, Xudong
;
Li, Xinghua
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Cryptography
Global positioning system
Information services
Location
Manufacture
Search engines
Telecommunication services
Wireless sensor networks
Location privacy protection
Mobile communication networks
Mobile intelligent terminals
Positioning technologies
Privacy protection model
Search information
Searchable encryptions
Security properties
Information Security Protocol Based System Identification with Binary-Valued Observations
期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 卷号: 31, 期号: 4, 页码: 946-963
作者:
Xu, Changbao
;
Zhao, Yanlong
;
Zhang, Ji-Feng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2018/07/30
Cryptography
identification algorithm
information security
passive attacks
security protocol
time complexity
Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 卷号: 67, 期号: 8, 页码: 7698-7711
作者:
Hu, Qin
;
Wang, Shengling
;
Hu, Chunqiang
;
Huang, Jianhui
;
Li, Wei
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2019/12/10
Location based services
query content protection
privacy protection
security
A based on blinded CP-ABE searchable encryption cloud storage service scheme
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 卷号: 31, 期号: 10
作者:
Cao, Laicheng
;
Zhang, Jinbo
;
Dong, Xiaoye
;
Xi, Chengzhe
;
Wang, Yafei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
blinded attribute
cloud storage
multiple data owners
users
pre-decryption
searchable encryption
Secure and privacy-preserving data sharing in the cloud based on lossless image coding
期刊论文
SIGNAL PROCESSING, 2018, 卷号: 148, 页码: 91-101
作者:
Khelifi, Fouad
;
Brahimi, Tahar
;
Han, Jungong
;
Li, Xuelong
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2018/12/11
Reversible Data Hiding
Encryption
Confidentiality
Security
Capacity
Privacy-preserving Cloud
Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme
期刊论文
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 卷号: 28, 期号: 7, 页码: 27
作者:
Lin, Zhuosheng
;
Yu, Simin
;
Feng, Xiutao
;
Lu, Jinhu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2019/12/13
Chaotic stream cipher
divide-and-conquer attack
chosen-ciphertext attack
improved chaotic encryption algorithm
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States
期刊论文
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 卷号: 57, 期号: 6, 页码: 1705-1715
作者:
Zhang, HuanGuo
;
Liang, XiaoYan
;
Wu, WanQing
;
Cai, QingYu
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2018/08/15
Quantum Cryptography
Quantum Public Key Cryptosystem
Ciphertext Indistinguishability
Chosen Plaintext Attack
Holevo's Theorem
Bell States
Multiuser access control searchable privacy-preserving scheme in cloud storage
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 卷号: 31, 期号: 9
作者:
Cao, Laicheng
;
Wang, Yafei
;
Dong, Xiaoye
;
Liu, Yufei
;
Zhang, Yangyang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
attribute-based encryption
cloud storage
multiuser
privacy preserving
searchable encryption
Research on trusted DNP3-BAE protocol based on hash chain
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018, 卷号: 2018, 期号: 1
作者:
Lu, Ye
;
Feng, Tao
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/15
Industrial control system
DNP3 protocol
Trusted Computing
Span
©版权所有 ©2017 CSpace - Powered by
CSpace