×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [4]
北京航空航天大学 [2]
兰州大学 [2]
湖南大学 [2]
华南理工大学 [1]
沈阳自动化研究所 [1]
更多...
内容类型
期刊论文 [9]
会议论文 [2]
会议 [1]
发表日期
2022 [1]
2019 [1]
2017 [4]
2013 [2]
2011 [1]
2010 [1]
更多...
学科主题
Computer T... [1]
automation... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Privacy-Preserving Publicly Verifiable Databases
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 3, 页码: 1639-1654
作者:
Wang Q(王强)
;
Zhou FC(周福才)
;
Zhou BY(周搏洋)
;
Xu J(徐剑)
;
Chen CY(陈春雨)
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/05/29
Cloud computing
Encryption
Protocols
Indexes
Verifiable databases
privacy-preserving
publicly verifiable
cloud computing
Privacy-preserving and publicly verifiable protocol for outsourcing polynomials evaluation to a malicious cloud
期刊论文
International Journal of Digital Crime and Forensics, 2019, 卷号: 11, 期号: 4, 页码: 14-27
作者:
Xie, Dawei
;
Yang, Haining
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
Blind verification
Cloud computing
Large polynomials
Privacy
Publicly verifiable
Confidentiality-Preserving Publicly Verifiable Computation
期刊论文
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 卷号: 28, 期号: 6, 页码: 799-818
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/12
Attribute-based encryption
confidentiality-preserving publicly
verifiable computation
delegatable outsourcing computation
public
verification
Confidentiality-Preserving Publicly Verifiable Computation
会议论文
10th International Conference on Provable Security (ProvSec), Nanjing Univ Finance & Econ, Nanjing, PEOPLES R CHINA, 2017-09-01
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Attribute-based encryption
confidentiality-preserving publicly verifiable computation
delegatable outsourcing computation
public verification
Confidentiality-Preserving Publicly Verifiable Computation
期刊论文
10th International Conference on Provable Security (ProvSec), 2017, 卷号: 28, 页码: 799-818
作者:
Sun, Jiameng
;
Zhu, Binrui
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Attribute-based encryption
confidentiality-preserving publicly verifiable computation
delegatable outsourcing computation
public verification
Publicly Verifiable Watermarking for Intellectual Property Protection in FPGA Design
期刊论文
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2017, 卷号: Vol.25 No.4, 页码: 1520-1527
作者:
Zhang, JL
;
Liu, LL
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
Watermarking
Field programmable gate arrays
IP networks
Protocols
Table lookup
Robustness
Cryptography,zero knowledge
Field-programmable gate array (FPGA)
intellectual property (IP) protection
publicly verifiable
watermarking
Publicly verifiable secret sharing scheme based on the Chinese Remainder Theorem
会议论文
International Conference on Mechatronics and Control Engineering (ICMCE 2012), Guangzhou, PEOPLES R CHINA, NOV 29-30, 2012
作者:
Jia, XX
;
Wang, DS
;
Wu, YJ
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/01/20
publicly verifiable secret sharing
joint random secret share
Chinese Remainder Theorem
A chaotic-based publicly verifiable FPGA IP watermark detection scheme
期刊论文
Scientia Sinica Informationis, 2013, 卷号: Vol.43 No.9, 页码: 1096-1110
作者:
Zhang Jiliang
;
Lin Yaping
;
Lyu Yongqiang
;
Wang Xiangqi
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/01/05
watermarking
FPGA
IP protection
chaotic
publicly verifiable
zero knowledge
time-stamp
Two protocols for member revocation in secret sharing schemes
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 卷号: 6749 LNCS, 页码: 64-70
作者:
Yu, Jia
;
Kong, Fanyu
;
Cheng, Xiangguo
;
Hao, Rong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/26
key revocation
publicly verifiable secret sharing
secret sharing
threshold cryptography
公共可验证秘密共享方案中多用户注册方案
期刊论文
清华大学学报(自然科学版), 2010, 卷号: 50, 期号: 4, 页码: 529-532+538
作者:
贾星星
;
王道顺
;
伍渝江
;
李顺东
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2016/07/28
公共可验证秘密共享
秘密分存
零知识证明
Access structure
Non-interactive
Publicly verifiable
Publicly verifiable secret sharing
Secret share
Secret sharing schemes
Zero knowledge proof
©版权所有 ©2017 CSpace - Powered by
CSpace