×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [11]
内容类型
期刊论文 [8]
会议论文 [3]
发表日期
2019 [1]
2018 [1]
2017 [3]
2011 [1]
2008 [3]
2007 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Privacy-preserving and publicly verifiable protocol for outsourcing polynomials evaluation to a malicious cloud
期刊论文
International Journal of Digital Crime and Forensics, 2019, 卷号: 11, 期号: 4, 页码: 14-27
作者:
Xie, Dawei
;
Yang, Haining
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
Blind verification
Cloud computing
Large polynomials
Privacy
Publicly verifiable
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2018
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Ma, Jixin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
Confidentiality-Preserving Publicly Verifiable Computation
期刊论文
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 卷号: 28, 期号: 6, 页码: 799-818
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/12
Attribute-based encryption
confidentiality-preserving publicly
verifiable computation
delegatable outsourcing computation
public
verification
A confidentiality preserving publicly verifiable computation for multivariate polynomials
期刊论文
Proceedings - 2017 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2017, 2017, 页码: 5-12
作者:
Jiameng, Sun
;
Binrui, Zhu
;
Jing, Qin
;
Jixin, Ma
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/12
Big Data
Cloud computing
High degree polynomial
Outsourcing computation
A Confidentiality Preserving Publicly Verifiable Computation for Multivariate Polynomials
会议论文
15th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications (SERA), JUN 07-09, 2017
作者:
Sun Jiameng
;
Zhu Binrui
;
Jing, Qin
;
Ma Jixin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/31
cloud computing
Big Data
outsourcing computation
high degree
polynomial
Two protocols for member revocation in secret sharing schemes
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 卷号: 6749 LNCS, 页码: 64-70
作者:
Yu, Jia
;
Kong, Fanyu
;
Cheng, Xiangguo
;
Hao, Rong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/26
key revocation
publicly verifiable secret sharing
secret sharing
threshold cryptography
Publicly verifiable secret sharing member-join protocol for threshold signatures
期刊论文
Journal of Communications, 2008, 卷号: 3, 期号: 7, 页码: 36-43
作者:
Yu, Jia
;
Kong, Fanyu
;
Hao, Rong
;
Li, Xuliang
;
Li, Guowen
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/26
Publicly verifiable secret sharing
Verifiable encryption
Verifiable secret redistribution
Verifiable secret sharing
Server-assisted publicly verifiable secret sharing with proactive property
期刊论文
Journal of Computational Information Systems, 2008, 卷号: 4, 期号: 6, 页码: 2933-2939
作者:
Yu, Jia
;
Hao, Rong
;
Kong, Fanyu
;
Li, Guowen
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/26
Key escrow
Proactive security
Server-assisted cryptography
Zero-knowledge proof
A publicly verifiable dynamic sharing protocol for data secure storage
期刊论文
Proceedings - The 9th International Conference on Web-Age Information Management, WAIM 2008, 2008, 页码: 471-472
作者:
Yu, Jia
;
Kong, Fanyu
;
Hao, Rong
;
Cheng, Zhen
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/26
Publicly verifiable secret sharing with enrollment ability
会议论文
8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing/3rd ACIS International Workshop on Self-Assembling Wireless Networks, JUL 30-AUG 01, 2007
作者:
Yu, Jia
;
Kong, Fanyu
;
Hao, Rong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
©版权所有 ©2017 CSpace - Powered by
CSpace