×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [51]
武汉大学 [31]
北京大学 [19]
北京航空航天大学 [17]
山东大学 [14]
厦门大学 [7]
更多...
内容类型
期刊论文 [113]
会议论文 [46]
其他 [8]
学位论文 [6]
会议 [1]
发表日期
2022 [1]
2019 [5]
2018 [6]
2017 [23]
2016 [10]
2015 [7]
更多...
学科主题
Computer S... [9]
Informatio... [3]
计算机科学技术基础学... [2]
Computer S... [1]
Telecommun... [1]
主题分类subjec... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共174条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The Future of Management: DAO to Smart Organizations and Intelligent Operations
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 11
作者:
Li, Juanjuan
;
Qin, Rui
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2023/02/22
Decentralized autonomous organizations and operations (DAO)
management foundation model
management intelligence
management operating system (MOS)
metaverse
parallel management
An Efficient and Secure Authentication Scheme for Vehicle Sensor Networks
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 2
作者:
Zhang, Jiani
;
He, Debiao
;
Kumar, Neeraj
;
Choo, Kim-Kwang Raymond
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Vehicle Sensor Networks
Vehicle-to-vehicle
Provable security
ECC-based authentication
Identity-Based Broadcast Encryption with Efficient Revocation
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 卷号: 11442 LNCS, 页码: 405-435
作者:
Ge, Aijun
;
Wei, Puwen
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/11
Asymmetric pairings
Broadcast encryption
Constant size ciphertext
Provable security
Revocation
Implementation and security analysis of practical quantum secure direct communication
期刊论文
LIGHT-SCIENCE & APPLICATIONS, 2019, 卷号: 8, 页码: 22
作者:
Qi, Ruoyang
;
Sun, Zhen
;
Lin, Zaisheng
;
Niu, Penghao
;
Hao, Wentao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Forward error correction
Quantum computers
Quantum cryptography
Quantum theory
Secure communication
Supercomputers
Experimental demonstrations
Low-density parity-check (LDPC) codes
Proof of principles
Provable security
Quantum secure direct communication
Realistic environments
Secret information
Security analysis
Quantum communication
HIBGE: Monitorable and Traceable Anonymous Encryption in Cloud Computing
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 页码: 637-650
作者:
Li, Dawei
;
Liu, Jianwei
;
Wu, Qianhong
;
Guan, Zhenyu
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/12/30
Hierarchical Identity-Based Group Encryption
Cloud computing
Anonymity
Traceability
Provable security
Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper)
会议论文
London, United kingdom, August 19, 2019 - August 22, 2019
作者:
Feng, Tao
;
Jiao, Ying
;
Fang, Junli
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/15
Blockchain
Digital storage
Network security
Distributed environments
Medical cloud (MC)
Medical institutions
Privacy preserving
Provable security
Proxy re encryptions
Random Oracle model
Security analysis
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
期刊论文
IEEE SYSTEMS JOURNAL, 2018, 卷号: 12, 期号: 2
作者:
He, Debiao
;
Kumar, Neeraj
;
Khan, Muhammad Khurram
;
Wang, Lina
;
Shen, Jian
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/05
Anonymity
authentication scheme
mobile cloud computing (MCC)
privacy
provable security
New Efficient Certificateless Aggregate Signature Scheme
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2018, 卷号: 19, 期号: 7
作者:
Xu, Zhiyan
;
Wu, Libing
;
Ren, Yongjun
;
He, Debiao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Cryptanalysis
Signature forgery attack
Provable security
Certificateless aggregate signature
Practical Range Proof for Cryptocurrency Monero with Provable Security
期刊论文
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 卷号: 10631, 页码: 255-262
作者:
Li, Kang
;
Yang, Rupeng
;
Au, Man Ho
;
Xu, Qiuliang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
A New Post-Quantum Blind Signature From Lattice Assumptions
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 27251-27258
作者:
Zhang, Pingyuan
;
Jiang, Han
;
Zheng, Zhihua
;
Hu, Peichu
;
Xu, Qiuliang
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/12/11
Post-quantum cryptography
blind signatures
lattices
provable
security
digital cash system
©版权所有 ©2017 CSpace - Powered by
CSpace