×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [22]
内容类型
会议 [22]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共22条,第1-10条
帮助
限定条件
内容类型:会议
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Secure conjunctive multi-keyword search for multiple data owners in cloud computing (EI收录)
会议
Wuhan, Hubei, China,
作者:
Yin, Hui[1,2]
;
Qin, Zheng[1]
;
Zhang, Jixin[1]
;
Li, Wenjie[1]
;
Ou, Lu[1]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/04/11
Cloud computing
Cryptography
Network security
Query processing
Efficient Approximate Search Using VGRAM over Encrypted Cloud Data (EI收录)
会议
Huangshan, Anhui, China,
作者:
Han, Lidong[1]
;
Hu, Changhui[2]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/12
Cloud computing
Cryptography
Digital storage
Hamming distance
An insider attack on shilling attack detection for recommendation systems (EI收录)
会议
Beijing, China,
作者:
Luo, Zhifeng[1]
;
Liang, Chen[1]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/11
Cryptography
Recommender systems
Two approaches to build UOV variants with shorter private key and faster signature generation (EI收录)
会议
Beijing, China,
作者:
Tan, Yang[1]
;
Tang, Shaohua[1]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/11
Cryptography
Public key cryptography
Security of data
Fast implementation of simple matrix encryption scheme on modern x64 CPU (EI收录)
会议
Zhangjiajie, China,
作者:
Peng, Zhiniang[1]
;
Tang, Shaohua[1]
;
Chen, Ju[1]
;
Wu, Chen[1]
;
Zhang, Xinglin[1]
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/11
Outages
Probability
Public key cryptography
Security of data
Security systems
Secure Data Outsourcing with Adversarial Data Dependency Constraints (EI收录)
会议
New York, NY, United states,
作者:
Dong, Boxiang[1]
;
Wang, Wendy[1]
;
Yang, Jie[2]
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/04/11
Cloud computing
Cryptography
Finite difference method
Heuristic algorithms
Heuristic methods
Human computer interaction
Information management
Optimization
Outsourcing
Security of data
Two Approaches to Build UOV Variants with Shorter Private Key and Faster Signature Generation (CPCI-S收录)
会议
作者:
Tan, Yang[1]
;
Tang, Shaohua[1]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/04/11
Multivariate public cryptography
UOV
Rainbow
Multivariate symmetric cryptography with 2-dimesion chaotic disturbation (EI收录)
会议
Yangzhou, China,
作者:
Sun, Xiaoyan[1]
;
Liu, Heng[2]
;
Zhang, Maosheng[3]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/11
Affine transforms
Chaotic systems
Public key cryptography
Signal processing
Wireless telecommunication systems
Watermarking algorithm for color two-dimensional code based on DCT-SVD (EI收录)
会议
Hangzhou, China,
作者:
Guo, Qian[1,3]
;
Chen, Guangxue[1]
;
Chen, Linlin[2,3]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/11
Algorithms
Codes (symbols)
Color
Copyrights
Cryptography
Digital watermarking
Packaging materials
Printing
Visual communication
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security (EI收录)
会议
Melbourne, VIC, Australia,
作者:
He, Kai[1,2]
;
Weng, Jian[1]
;
Au, Man Ho[3]
;
Mao, Yijun[4,5]
;
Deng, Robert H.[6]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/11
Public key cryptography
Radio broadcasting
Radio communication
Robustness (control systems)
Security of data
Signal receivers
©版权所有 ©2017 CSpace - Powered by
CSpace