×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [4]
北京大学 [3]
兰州理工大学 [3]
软件研究所 [3]
厦门大学 [2]
北京航空航天大学 [2]
更多...
内容类型
期刊论文 [12]
会议论文 [7]
学位论文 [4]
会议 [1]
其他 [1]
发表日期
2019 [5]
2018 [3]
2017 [1]
2016 [1]
2015 [1]
2014 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共25条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Non-Cooperative Game of Throughput and Hash Length for Adaptive Merkle Tree in Mobile Wireless Networks
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 卷号: 68, 页码: 4625-4650
作者:
Sun, Zemin
;
Liu, Yanheng
;
Wang, Jian
;
Mei, Fang
;
Deng, Weiwen
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Mobile wireless network
Merkle tree
throughput
hash length
Nash equilibrium
Detection of Entity-Description Conflict on Duplicated Data Based on Merkle-Tree for IIoT
会议论文
Qingdao, China, September 20-22, 2019
作者:
Wang, Yan
;
Zeng, Hui
;
Yang, Bingqing
;
Zhu Z(朱珠)
;
Song, Baoyan
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2019/12/08
Entity-description conflict on duplicated data
IIoT
Merkle-tree
MPR Based Secure Content Routing Scheme for NDN-MANET
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/02/24
Named data networking
MANET
Merkle tree
Secure content routing
MPR based secure content routing scheme for NDN-MANET
期刊论文
Journal of Internet Technology, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/14
Authentication
Floods
Forestry
Mobile ad hoc networks
Network security
Trees (mathematics)
Content routing
MANET
Merkle trees
Named data networkings
Security attributes
Security mechanism
Source authentication
Statistical detection
Detection of Entity-Description Conflict on Duplicated Data Based on Merkle-Tree for IIoT
会议论文
Qingdao, China, September 20-22, 2019
作者:
Wang, Yan
;
Zeng, Hui
;
Yang, Bingqing
;
Zhu Z(朱珠)
;
Song, Baoyan
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/12/08
Entity-description conflict on duplicated data
IIoT
Merkle-tree
BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems
期刊论文
Journal of Medical Systems, 2018, 卷号: 42, 期号: 8, 页码: 147-
作者:
Ji, Yaxian
;
Zhang, Junwei*
;
Ma, Jianfeng
;
Yang, Chao
;
Yao, Xin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/03
Blockchain
Location sharing
Merkle tree
Multi-level privacy preserving
Order-preserving encryption
A new fog-cloud storage framework with transparency and auditability
会议论文
作者:
Kim, Yeojin
;
Kim, Donghyun
;
Son, Junggab
;
Wang, Wei
;
Noh, Youngtae
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
Data Audit
Fog Cloud Storage
Fog Computing
Integer Factorization
Merkle Hash Tree
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 2
作者:
Miao, Meixia
;
Ma, Jianfeng
;
Huang, Xinyi
;
Wang, Qian
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/05
Verifiable large database
delegating polynomial functions
Merkle sum hash tree
bilinear pairings
A position-aware Merkle tree for dynamic cloud data integrity verification
期刊论文
SOFT COMPUTING, 2017, 卷号: 21, 页码: 2151-2164
作者:
Mao, Jian
;
Zhang, Yan
;
Li, Pei
;
Li, Teng
;
Wu, Qianhong
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/30
Cloud storage
Provable data possession
Integrity checking
Merkle tree
A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment
期刊论文
MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 卷号: 2016
作者:
Cao, Laicheng
;
He, Wenwen
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/15
Mathematical techniques
©版权所有 ©2017 CSpace - Powered by
CSpace