CORC

浏览/检索结果: 共10条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum 期刊论文
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 卷号: 18, 期号: 10
作者:  Chen, Yanjiao;  Tian, Xin;  Wang, Qian;  Li, Minghui;  Du, Minxin
收藏  |  浏览/下载:17/0  |  提交时间:2019/12/05
Outsourced Biometric Identification with Privacy 期刊论文
IEEE Transactions on Information Forensics and Security, 2018
作者:  Hu, Shengshan;  Li, Minghui;  Wang, Qian;  Chow, Sherman S. M.;  Du, Minxin
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum 期刊论文
IEEE Transactions on Mobile Computing, 2018
作者:  Chen, Yanjiao;  Tian, Xin;  Wang, Qian;  Li, Minghui;  Du, Minxin
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/05
Outsourced Biometric Identification With Privacy 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 10
作者:  Hu, Shengshan;  Li, Minghui;  Wang, Qian;  Chow, Sherman S. M.;  Du, Minxin
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 卷号: 26, 期号: 2
作者:  Chen, Jing;  He, Kun;  Du, Ruiying;  Zheng, Minghui;  Xiang, Yang
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Regenerating-codes-based efficient remote data checking and repairing in cloud storage 期刊论文
Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, 2015, 卷号: 1
作者:  Chen, Jing;  Yuan, Quan;  Du, Ruiying;  Zheng, Minghui;  Peng, Yuling
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
适于车载网安全通信的高效签密方案 期刊论文
电子学报, 2015, 卷号: 43, 期号: 3
作者:  张宇;  陈晶;  杜瑞颖;  周庆;  郑明辉
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05
Proofs of ownership and retrievability in cloud storage 期刊论文
Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, 2015
作者:  Du, Ruiying;  He, Kun;  Zheng, Minghui;  Chen, Jing;  Deng, Lan
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/05
Fault-tolerant topology control based on artificial immune theory in WMNs 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 卷号: 7873 LNCS
作者:  Zheng, Minghui;  Chen, Jing;  Xiang, Yang;  Du, Ruiying;  Zhao, Li
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/05
Intrusion Detection Model Based on Incomplete Information Game in Wireless Mesh Networks 期刊论文
CHINA COMMUNICATIONS, 2012, 卷号: 9, 期号: 10
作者:  Chen Jing;  Du Ruiying;  Yu Fajiang;  Zheng Minghui;  Zhang Huanguo
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace