CORC

浏览/检索结果: 共50条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A non-interactive verifiable computation model of perceptual layer data based on CP-ABE 会议论文
Guangzhou, China, January 14-16, 2022
作者:  Zhao JM(赵剑明);  Miao, Weiwei;  Zeng, Zeng
收藏  |  浏览/下载:13/0  |  提交时间:2022/04/13
Privacy-Preserving Publicly Verifiable Databases 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 3, 页码: 1639-1654
作者:  Wang Q(王强);  Zhou FC(周福才);  Zhou BY(周搏洋);  Xu J(徐剑);  Chen CY(陈春雨)
收藏  |  浏览/下载:18/0  |  提交时间:2022/05/29
Securing Parked Vehicle Assisted Fog Computing With Blockchain and Optimal Smart Contract Design 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2020, 卷号: 7, 期号: 2, 页码: 426-441
作者:  Xumin Huang;  Dongdong Ye;  Rong Yu;  Lei Shu
收藏  |  浏览/下载:8/0  |  提交时间:2021/03/11
An improved scheme for outsourced computation with attribute-based encryption 会议论文
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), DEC 13-15, 2017
作者:  Yang, Haining;  Sun, Jiameng;  Qin, Jing;  Ma, Jixin
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/31
An IBE Scheme with Verifiable Outsourced Key Generation Based on a Single Server 期刊论文
IETE TECHNICAL REVIEW, 2018, 卷号: 35, 页码: 97-105
作者:  Xue, Ting[1];  Ren, Yanli[2];  Feng, Guorui[3]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/22
Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server 期刊论文
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, 卷号: E101A, 页码: 608-611
作者:  Dong, Min[1];  Ren, Yanli[2];  Feng, Guorui[3]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/22
An improved scheme for outsourced computation with attribute-based encryption 期刊论文
Concurrency Computation, 2018
作者:  Yang H.;  Sun J.;  Qin J.;  Ma J.
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/11
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2018
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Ma, Jixin
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/11
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption 期刊论文
SOFT COMPUTING, 2018, 卷号: 22, 期号: 3
作者:  Li, Jing;  Li, Xiong;  Wang, Licheng;  He, Debiao;  Ahmad, Haseeb
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/05
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption 期刊论文
Soft Computing, 2018, 卷号: Vol.22 No.3, 页码: 707-714
作者:  Li, Jing;  Li, Xiong;  Wang, Licheng;  He, Debiao;  Ahmad, Haseeb
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/26


©版权所有 ©2017 CSpace - Powered by CSpace