×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [27]
湖南大学 [19]
山东大学 [11]
大连理工大学 [4]
北京航空航天大学 [4]
安徽大学 [4]
更多...
内容类型
期刊论文 [71]
会议论文 [12]
其他 [3]
发表日期
2019 [86]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共86条,第1-10条
帮助
限定条件
发表日期:2019
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Towards privacy preserving social recommendation under personalized privacy settings
期刊论文
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2019, 卷号: 22, 期号: 6, 页码: 2853-2881
作者:
Meng, Xuying
;
Wang, Suhang
;
Shu, Kai
;
Li, Jundong
;
Chen, Bo
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/12/10
Differential privacy
Social recommendation
Ranking
Personalized privacy settings
LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for N-Times Computing Offloading in IoT
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 期号: 3, 页码: 4462-4471
作者:
Guizani, Mohsen
;
Du, Xiaojiang
;
Zhu, Liehuang
;
Xu, Yongjun
;
Wang, Fei
收藏
  |  
浏览/下载:49/0
  |  
提交时间:2019/08/16
Authentication
computing offloading (CO)
Internet of Things (IoT)
privacy preserving
Distant Supervised Centroid Shift: A Simple and Efficient Approach to Visual Domain Adaptation
会议论文
USA, 2019
作者:
Jian Liang
;
Ran He
;
Zhenan Sun
;
Tieniu Tan
收藏
  |  
浏览/下载:109/0
  |  
提交时间:2019/06/10
Domain Adaptation
Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system
期刊论文
Information Sciences, 2019, 卷号: 479, 页码: 567-592
作者:
Yang, Yang
;
Zheng, Xianghan
;
Guo, Wenzhong
;
Liu, Ximeng
;
Chang, Victor
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2019/11/19
Access control mechanism
Access control policies
Access control technologies
De duplications
Emergency scenario
Emergency situation
Privacy preserving
Self-Adaptive
An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication In Vehicular Ad Hoc Network
期刊论文
IEEE Access, 2019, 卷号: 7, 期号: 99, 页码: 55050-55063
作者:
Wu, Libing*
;
Sun, Qianqian
;
Wang, Xinpei
;
Wang, Jing
;
Yu, Shui
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/12/04
V2V
VANETs
authentication
identity guessing attack
privacy-preserving
security
A robust, distributed, and privacy-preserving aggregation scheme for smart grid communications
期刊论文
Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch K'an, 2019, 卷号: 42, 期号: 1, 页码: 54-65
作者:
Shen, Gang
;
Su, Yixin*
;
Zhang, Danhong
;
Zhang, Cheng
;
Zhang, Mingwu
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/04
Electricity aggregation
privacy-preserving
robustness
smart grid
Privacy-preserving raw data collection without a trusted authority for IoT
期刊论文
COMPUTER NETWORKS, 2019, 卷号: 148, 页码: 340-348
作者:
Liu, Yi-Ning*
;
Wang, Yan-Ping
;
Wang, Xiao-Fen
;
Xia, Zhe
;
Xu, Jing-Fang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/04
IoT
Data sharing
Data privacy
Shuffle
Raw data
Unlinkability
Privacy-Preserving Content Dissemination for Vehicular Social Networks: Challenges and Solutions
期刊论文
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 卷号: 21, 页码: 1314-1345
作者:
Wang, Xiaojie
;
Ning, Zhaolong
;
Zhou, MengChu
;
Hu, Xiping
;
Wang, Lei
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2019/12/02
Vehicular social networks
content dissemination
potential attacks
individual privacy
attack resistance
A survey on location privacy protection in Wireless Sensor Networks
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 卷号: 125, 页码: 93-114
作者:
Jiang, Jinfang
;
Han, Guangjie
;
Wang, Hao
;
Guizani, Mohsen
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/02
Wireless Sensor Networks
Location privacy preserving
Location anonymity
Phantom routing
Privacy preserving weighted similarity search scheme for encrypted data
期刊论文
IET INFORMATION SECURITY, 2019, 卷号: 13, 页码: 61-69
作者:
Guo, Cheng
;
Tian, Pengxu
;
Chang, Chin-Chen
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/02
cryptography
outsourcing
cloud computing
data privacy
different weighted searches
encrypted data
searchable symmetric encryption
data users
search request
homomorphic encryption
weight problem
weight information
weighted similarity search scheme
cloud computing
outsourced data
privacy concerns
searchable encryption
different users
different requirements
©版权所有 ©2017 CSpace - Powered by
CSpace