×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [3]
西安交通大学 [1]
上海大学 [1]
内容类型
期刊论文 [3]
会议论文 [2]
发表日期
2021 [1]
2019 [1]
2018 [1]
2010 [2]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共5条,第1-5条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Blockchain Data Sharing Scheme Based on Searchable Agent Re-encryption
期刊论文
International Journal of Network Security, 2021, 卷号: 23, 期号: 3, 页码: 535-544
作者:
Feng, Tao
;
Pei, Hongmei
;
Xie, Pengshoou
;
Feng, Xiaoqing
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/02/17
Access control
Blockchain
Data privacy
Data Sharing
Digital storage
Query processing
External database
Privacy disclosures
Proxy encryptions
Proxy re encryptions
Searchable encryptions
Searchable proxy re encryptions
Sharing schemes
Transaction information
Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper)
会议论文
London, United kingdom, August 19, 2019 - August 22, 2019
作者:
Feng, Tao
;
Jiao, Ying
;
Fang, Junli
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/15
Blockchain
Digital storage
Network security
Distributed environments
Medical cloud (MC)
Medical institutions
Privacy preserving
Provable security
Proxy re encryptions
Random Oracle model
Security analysis
Privacy-aware transmission scheme based on homomorphic proxy re-encryption for NDN
期刊论文
International Journal of Security and Networks, 2018, 卷号: 13, 期号: 1, 页码: 58-70
作者:
Guo, Xian
;
Chen, Cheng
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Cao, Lai-Cheng
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/14
Data privacy
Network security
Content-centric networkings
Ho-momorphic encryptions
Named data networkings
Privacy protection
Proxy re encryptions
HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
期刊论文
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2010, 卷号: 21, 页码: 1049-1063
作者:
Ren, Yanli[1]
;
Gu, Dawu[2]
;
Wang, Shuozhong[3]
;
Zhang, Xinpengu[4]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/30
Hierarchical
identity-based encryption
proxy re-encryption
multiple re-encryptions
without random oracles
Group key management using proxy re-encryption for dynamic networks
会议论文
作者:
Zhang, Minqing
;
Wu, Xuguang
;
Han, Yiliang
;
Yang, Xiaoyuan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/18
Computation efficiency
Distributed protocols
Group management
Key distribution centers
Multi-recipient public key encryption
Proxy re encryptions
Secure multicastg
Wireless communications
©版权所有 ©2017 CSpace - Powered by
CSpace