CORC

浏览/检索结果: 共88条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:  Yu, Keping;  Tan, Liang;  Aloqaily, Moayad;  Yang, Hekun;  Jararweh, Yaser
收藏  |  浏览/下载:21/0  |  提交时间:2021/12/01
Group signature with time-bound keys and unforgeability of expiry time for smart cities 期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 卷号: 2021, 期号: 1
作者:  Fang, Junli;  Feng, Tao
收藏  |  浏览/下载:12/0  |  提交时间:2021/06/03
Cross-domain single sign-on authentication of information security in network environment 期刊论文
International Journal of Information and Communication Technology, 2021, 卷号: 18, 期号: 1, 页码: 89-104
作者:  Cui, A-Jun;  Wang, Wei;  Zhang, Hua-Feng;  Ma, Yan-Hong;  Li, Chen
收藏  |  浏览/下载:3/0  |  提交时间:2021/03/02
BacS: A blockchain-based access control scheme in distributed internet of things 期刊论文
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 页码: 15
作者:  Shi, Na;  Tan, Liang;  Yang, Ciaxia;  He, Chen;  Xu, Junli
收藏  |  浏览/下载:45/0  |  提交时间:2020/12/10
A Blockchain-Based Access Control Framework for Cyber-Physical-Social System Big Data 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 77215-77226
作者:  Tan, Liang;  Shi, Na;  Yang, Caixia;  Yu, Keping
收藏  |  浏览/下载:9/0  |  提交时间:2020/12/10
Authentication Technology in Industrial Control System Based on Identity Password 会议论文
Shenyang, China, July 27-29, 2020
作者:  Yang LY(杨路瑶);  Shang WL(尚文利);  Chen CY(陈春雨);  Wang TY(王天宇);  Liu ZB(刘周斌)
收藏  |  浏览/下载:3/0  |  提交时间:2020/10/10
ACS-HCA: An Access Control Scheme Under Hierarchical Cryptography Architecture 期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2019, 卷号: 28, 期号: 1
作者:  Shi Jiaoli;  Huang Chuanhe;  He Kai;  Shen Xieyang
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/05
Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage 期刊论文
2019, 卷号: 7, 页码: 66655-66667
作者:  Sun, Jin;  Ren, Lili;  Wang, Shangping;  Yao, Xiaomin
收藏  |  浏览/下载:14/0  |  提交时间:2019/12/20
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation 会议论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019-11-10
作者:  Zhang, Xiao;  Wu, Faguo;  Yao, Wang;  Wang, Zhao;  Wang, Wenhua
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/30
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 卷号: 31
作者:  Zhang, Xiao;  Wu, Faguo;  Yao, Wang;  Wang, Zhao;  Wang, Wenhua
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace