×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [8]
内容类型
期刊论文 [5]
会议论文 [3]
发表日期
2022 [1]
2020 [1]
2019 [2]
2018 [2]
2015 [2]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共8条,第1-8条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
One-Stop Efficient PKI Authentication Service Model Based on Blockchain
会议论文
Chengdu, China, October 11, 2019 - October 13, 2019
作者:
Feng, Tao
;
Chen, Wuyang
;
Zhang, Di
;
Liu, Chunyan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Blockchain
Public key cryptography
Authentication services
Batch update
Dynamic accumulators
Identity authentication
Public key infrastructure technologies
Storage overhead
Third-party service providers
User authentication
Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper)
会议论文
London, United kingdom, August 19, 2019 - August 22, 2019
作者:
Feng, Tao
;
Jiao, Ying
;
Fang, Junli
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/15
Blockchain
Digital storage
Network security
Distributed environments
Medical cloud (MC)
Medical institutions
Privacy preserving
Provable security
Proxy re encryptions
Random Oracle model
Security analysis
An efficient and anonymous KP-ABE scheme with keyword search
会议论文
Kowloon, Hong kong, June 25, 2018 - June 27, 2018
作者:
Feng, Tao
;
Yin, Xiaoyu
;
Liu, Chunyan
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Search engines
Approximate greatest common divisors
Cloud storage systems
Cloud storages
Ho-momorphic encryptions
Identity authentication
KP-ABE
PEKS
Privacy preserving
Research on trusted DNP3-BAE protocol based on hash chain
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018, 卷号: 2018, 期号: 1
作者:
Lu, Ye
;
Feng, Tao
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/15
Industrial control system
DNP3 protocol
Trusted Computing
Span
Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 52248-52260
作者:
Feng, Xiaoqin
;
Ma, Jianfeng
;
Feng, Tao
;
Miao, Yinbin
;
Liu, Ximeng
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/15
Outsourcing feature extraction
consortium chain
smart contract
DAC
sharding technique
D2D communication
Intelligent Optimization Methods for the Design of an Overhead Travelling Crane
期刊论文
CHINESE JOURNAL OF MECHANICAL ENGINEERING, 2015, 卷号: 28, 期号: 1, 页码: 187-196
作者:
Qu Xiaogang
;
Xu Gening
;
Fan Xiaoning
;
Bi Xiaoheng
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/15
crane metal structure
design optimization
continuous array element encoded model
ant colony optimization
particle swarm optimization
genetic algorithm
Intelligent optimization methods for the design of an overhead travelling crane
期刊论文
Chinese Journal of Mechanical Engineering (English Edition), 2015, 卷号: 28, 期号: 1, 页码: 187-196
作者:
Qu Xiaogang
;
Xu Gening
;
Fan Xiaoning
;
Bi Xiaoheng
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2020/11/14
Ant colony optimization
Constrained optimization
Cranes
Genetic algorithms
Metals
Nonlinear programming
Particle swarm optimization (PSO)
Shape optimization
Structural optimization
Ant colony algorithms
Array elements
Constrained non-linear optimizations
Design optimization
Heuristic information
Intelligent optimization method
Metal structures
Objective function values
©版权所有 ©2017 CSpace - Powered by
CSpace