×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [4]
暨南大学 [2]
大连理工大学 [1]
山东大学 [1]
湖南大学 [1]
武汉理工大学 [1]
更多...
内容类型
会议论文 [11]
发表日期
2022 [1]
2019 [1]
2015 [1]
2014 [1]
2012 [1]
2011 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A non-interactive verifiable computation model of perceptual layer data based on CP-ABE
会议论文
Guangzhou, China, January 14-16, 2022
作者:
Zhao JM(赵剑明)
;
Miao, Weiwei
;
Zeng, Zeng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/13
CP-ABE
non-interactive verifiable computation
NPOT
An improved scheme for outsourced computation with attribute-based encryption
会议论文
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), DEC 13-15, 2017
作者:
Yang, Haining
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/31
blind verifiability
cloud computing
KP-ABE
verifiable computation
A Verifiable E-voting Scheme with Secret Sharing
会议论文
IEEE 16th International Conference on Communication Technology (ICCT), Beijing, PEOPLES R CHINA
作者:
Yuan, Lifeng
;
Li, Mingchu
;
Guo, Cheng
;
Hu, Weitong
;
Tan, Xing
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/09
E-voting
Verifiability
Secret sharing
Accountability
Distribution
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios
会议论文
8th International Conference on Network and System Security (NSS), Xian, PEOPLES R CHINA, OCT 15-17, 2014
作者:
Srinivasan, Sriramkrishnan
;
Culnane, Chris
;
Heather, James
;
Schneider, Steve
;
Xia, Zhe*
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/04
End-to-End Verifiable Voting
Helios
Token-Controlled Encryption
dynamic provable data possession with batch-update verifiability
会议论文
2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment, ICADE 2012, Beijing, China, July 27, 2012 - July 29, 2012
Wang Junxiang
;
Liu Shengli
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2013/09/22
Intelligent control
Trees (mathematics)
new chosen ciphertext secure public key encryption in the standard model with public verifiability
会议论文
7th International Conference on Intelligent Computing, ICIC 2011, Zhengzhou, China, August 11,
Weng Zhiwei
;
Weng Jian
;
He Kai
;
Li Yingkai
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2013/10/08
Computation theory
Intelligent computing
on the invisibility of designated confirmer signatures
会议论文
6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22,
Xia Fubiao
;
Wang Guilin
;
Xue Rui
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2011/10/10
Authentication
Network security
e
会议论文
19th International Conference on Advanced Information Networking and Applications, Taipei, TAIWAN, MAR 28-30,
Cao TJ
;
Lin DD
;
Xue R
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2011/07/28
ID-based ring authenticated encryption
enhance user privacy
recipient-ambiguity security
recipient-designation security
recipient-verifiability security
semantic-security
signer-ambiguity security
signer-verifiability security
verification-convert
New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
会议论文
Zhengzhou, PEOPLES R CHINA, AUG 11-14, 2011
作者:
Weng, Zhiwei[1]
;
Weng, Jian[1]
;
He, Kai[1]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/12/10
New chosen ciphertext secure public key encryption in the standard model with public verifiability
会议论文
Zhengzhou, China, August 11, 2011 - August 14, 2011
作者:
Weng, Zhiwei[1]
;
Weng, Jian[1,2,3]
;
He, Kai[1]
;
Li, Yingkai[1]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/12/13
©版权所有 ©2017 CSpace - Powered by
CSpace