×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [20]
内容类型
期刊论文 [11]
会议论文 [9]
发表日期
2020 [1]
2019 [3]
2018 [1]
2017 [4]
2016 [1]
2015 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共20条,第1-10条
帮助
限定条件
专题:北京航空航天大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Flexible attribute-based proxy re-encryption for efficient data sharing
期刊论文
Information Sciences, 2020, 卷号: 511, 页码: 94-113
作者:
Deng, Hua
;
Qin, Zheng
;
Wu, Qianhong
;
Guan, Zhenyu
;
Zhou, Yunya
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2019/12/30
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 11688-11697
作者:
Li, Dawei
;
Liu, Jianwei
;
Wu, Qianhong
;
Guan, Zhenyu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/30
Fog computing
attribute-based encryption
distributed access control
multi-authority
large-universe
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
会议论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019-11-10
作者:
Zhang, Xiao
;
Wu, Faguo
;
Yao, Wang
;
Wang, Zhao
;
Wang, Wenhua
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
ciphertext-policy attribute-based encryption
multi-authority attribute-based encryption
threshold access policy
user revocation
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 卷号: 31
作者:
Zhang, Xiao
;
Wu, Faguo
;
Yao, Wang
;
Wang, Zhao
;
Wang, Wenhua
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
ciphertext-policy attribute-based encryption
multi-authority attribute-based encryption
threshold access policy
user revocation
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10726 LNCS, 页码: 278-298
作者:
Feng, H.
;
Liu, J.
;
Wu, Q.
;
Liu, W.
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/30
Access control
Cloud computing
Digital storage
Public key cryptography
Security of data
Attribute-based
Cloud computing securities
Encrypted data
Fine grained
Fully homomorphic encryption
Generic construction
Key encapsulation mechanisms
Predicate encryptions
Cryptography
Achieving Flexible and Self-Contained Data Protection in Cloud Computing
期刊论文
IEEE ACCESS, 2017, 卷号: 5, 页码: 1510-1523
作者:
Lang, Bo
;
Wang, Jinmiao
;
Liu, Yanxi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Role-based access control
ciphertext-policy attribute-based encryption
self-contained data protection
cloud computing
Confidentiality-Preserving Publicly Verifiable Computation
会议论文
10th International Conference on Provable Security (ProvSec), Nanjing Univ Finance & Econ, Nanjing, PEOPLES R CHINA, 2017-09-01
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Attribute-based encryption
confidentiality-preserving publicly verifiable computation
delegatable outsourcing computation
public verification
Confidentiality-Preserving Publicly Verifiable Computation
期刊论文
10th International Conference on Provable Security (ProvSec), 2017, 卷号: 28, 页码: 799-818
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Attribute-based encryption
confidentiality-preserving publicly verifiable computation
delegatable outsourcing computation
public verification
Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption
会议论文
9th International Symposium on Cyberspace Safety and Security, CSS 2017, Xi'an, China, 2017-10-23
作者:
Li, Dawei
;
Chen, Jie
;
Liu, Jianwei
;
Wu, Qianhong
;
Liu, Weiran
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
An Efficient KP-ABE Scheme for Content Protection in Information-Centric Networking
会议论文
IEEE Symposium on Computers and Communication (ISCC), Messina, ITALY, 2016-01-01
作者:
Wang, Jinmiao
;
Lang, Bo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Information-Centric Networking
Content protection
Attribute based encryption
Fast key generation
Fast decryption
©版权所有 ©2017 CSpace - Powered by
CSpace