CORC

浏览/检索结果: 共21条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Contexts-States-Aware Access Control for Internet of Things 会议论文
作者:  Dong, Yuji;  Wan, Kaiyu;  Huang, Xin;  Yue, Yong
收藏  |  浏览/下载:23/0  |  提交时间:2019/11/19
Context-based Monitor Framework for Sensors Access in Smartphone 会议论文
3rd IEEE International Conference on Progress in Informatcs and Computing (IEEE PIC), 2015-12-18
作者:  Dai, Jiazhu[1];  Chen, Junyan[2]
收藏  |  浏览/下载:9/0  |  提交时间:2019/04/26
MOLAR: A Cost-Efficient, High-Performance Hybrid Storage Cache 会议论文
15th IEEE International Conference on Cluster Computing, CLUSTER 2013,  Indianapolis, IN
作者:  Liu, Yi;  Ge, Xiongzi;  Huang, Xiaoxia;  Du, David H. C.
收藏  |  浏览/下载:14/0  |  提交时间:2015/08/28
VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing 会议论文
ICST International Conference on Security and Privacy in Communication Networks, Sydney, Australia, 2013/9/25-2013/9/27
Jun Jiang; Meining Nie; Purui Su; Dengguo Feng
收藏  |  浏览/下载:17/0  |  提交时间:2013/12/02
Based on the attribute encrypted cloud storage scheme 会议论文
Shiyan, Hubei, China, June 21, 2013 - June 23, 2013
作者:  Zhu, Li-Ye
收藏  |  浏览/下载:22/0  |  提交时间:2020/11/15
attribute-tree based hierarchical hidden credential model 会议论文
2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012, Shenyang, Liaoning, China, May 25, 2012 - May 27, 2012
Ge Weijin; Hu Xiaohui
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22
ciphertext policy attribute-based encryption from lattices: extended abstract 会议论文
7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, Seoul, Korea, Republic of, May 2, 2012 - May 4, 2012
Zhang Jiang; Zhang Zhenfeng; Ge Aijun
收藏  |  浏览/下载:10/0  |  提交时间:2013/09/22
Access control based on group signatures in cloud service 会议论文
作者:  Zheng, Han;  Zhao, Zhongmeng;  Zhang, Xuanping
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/10
efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost 会议论文
5th International Conference on Provable Security, ProvSec 2011, Xi'an, China, 16-Oct
Chen Cheng; Zhang Zhenfeng; Feng Dengguo
收藏  |  浏览/下载:11/0  |  提交时间:2011/10/10
Query rewriting in spatial database for access control 会议论文
2nd International Conference on Computing for Geospatial Research and Applications, COM.Geo 2011, Washington, DC, United states, May 23, 2011 - May 25, 2011
Chen, Zhen(陈振); Chen Rongguo; Xie Jiong; Zhang Mingbo; Cheng Changxiu; Chen Yingdong
收藏  |  浏览/下载:17/0  |  提交时间:2011/11/11


©版权所有 ©2017 CSpace - Powered by CSpace