×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [9]
兰州理工大学 [7]
厦门大学 [1]
北京航空航天大学 [1]
内容类型
会议论文 [10]
期刊论文 [7]
学位论文 [1]
发表日期
2022 [1]
2019 [3]
2018 [2]
2017 [1]
2016 [1]
2013 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共18条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Cloud Storage Scheme on Attribute Blinding Fuzzy Searchable Encryption
期刊论文
Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 卷号: 39, 期号: 7, 页码: 706-713
作者:
Cao, Lai-Cheng
;
Wang, Wei-Ting
;
Kang, Yi-Fan
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Data privacy
Digital storage
Network security
Attribute blinding
Ciphertext-policy attribute-based encryptions
Cloud storages
Pre-decryption
Searchable encryptions
Research and application of digital oilfield cloud computing
会议论文
作者:
Jiao, Yang
;
Shi, Yujiang
;
Wang, Juan
;
Xie, Shan
;
Liang, Lixing
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2019/11/19
Centralized management
Changqing oilfield companies
Cloud storages
Integrated applications
Professional software
Research and application
Server resources
System infrastructure
An efficient and anonymous KP-ABE scheme with keyword search
会议论文
Kowloon, Hong kong, June 25, 2018 - June 27, 2018
作者:
Feng, Tao
;
Yin, Xiaoyu
;
Liu, Chunyan
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Search engines
Approximate greatest common divisors
Cloud storage systems
Cloud storages
Ho-momorphic encryptions
Identity authentication
KP-ABE
PEKS
Privacy preserving
User privacy-preserving cloud storage scheme on CP-ABE
期刊论文
Qinghua Daxue Xuebao/Journal of Tsinghua University, 2018, 卷号: 58, 期号: 2, 页码: 150-156
作者:
Cao, Laicheng
;
Liu, Yufei
;
Dong, Xiaoye
;
Guo, Xian
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Digital storage
Security of data
Attribute-based encryptions
Cloud storages
Distributed proxies
Privacy preserving
Searchable encryptions
Design of Cloud Data Storage and Processing System
会议论文
International Conference on Big Data and Artificial Intelligence, BDAI 2018
作者:
Zhou, B.
;
Chou, W.
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/30
Artificial intelligence
Big data
Cloud computing
Data handling
Aliyun platform
Cloud servers
Cloud storages
Computing functions
Dynamic displays
Environment information
Processing systems
Sensor technologies
Digital storage
Generic construction of role-based encryption in the standard model
期刊论文
International Journal of Security and Networks, 2017, 卷号: 12, 页码: 198-205
作者:
Li, BaoHong
;
Li, BaoJun
;
Zhao, YinLiang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
Access control policies
Adaptive security
Ciphertexts
Cloud storages
Inner product
Partial order relation
Role hierarchy
Role-based
Role-based Access Control
User revocation
基于流量感知的多云存储联合同步方案的设计与实现
学位论文
2016, 2016
郑涛
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/06/20
多云存储
流量感知调度
文件同步
Multiple Cloud Storages
Traffic-aware scheduling
File Synchronization
Researching on the placement of data replicas in the system of HDFS cloud storage cluster
会议论文
Yangzhou, Jiangsu, China, August 23, 2013 - August 25, 2013
作者:
Bao, Guangbin
;
Yu, Chaojia
;
Zhao, Hong
;
Luan, Yangyang
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/15
Automation
Fault tolerance
Cloud storages
Cluster systems
Data replica
Entropy weights
Evaluation criteria
HDFS
Map/reduce
Selection algorithm
Based on the attribute encrypted cloud storage scheme
会议论文
Shiyan, Hubei, China, June 21, 2013 - June 23, 2013
作者:
Zhu, Li-Ye
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2020/11/15
Cryptography
Access control models
Access control policies
Ciphertexts
Cloud storage services
Cloud storages
Conspiracy attack
Formatting
Security problems
©版权所有 ©2017 CSpace - Powered by
CSpace