×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [7]
软件研究所 [6]
厦门大学 [4]
暨南大学 [3]
湖南大学 [3]
兰州理工大学 [2]
更多...
内容类型
期刊论文 [27]
会议论文 [11]
学位论文 [2]
发表日期
2022 [1]
2021 [1]
2020 [1]
2019 [2]
2018 [5]
2017 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共40条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
A non-interactive verifiable computation model of perceptual layer data based on CP-ABE
会议论文
Guangzhou, China, January 14-16, 2022
作者:
Zhao JM(赵剑明)
;
Miao, Weiwei
;
Zeng, Zeng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/13
CP-ABE
non-interactive verifiable computation
NPOT
Secure Data Collaborative Computing Scheme Based on Blockchain
期刊论文
Security and Communication Networks, 2021, 卷号: 2021
作者:
Feng, Tao
;
Wang, Xusheng
;
Liu, Chunyan
;
Fang, Junli
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2021/03/02
Blockchain
Digital storage
Electronic voting
Privacy by design
Anti collusions
Bloom filters
Data informations
Data storage
Secret sharing
Secure multi-party computation
Security datum
Verifiability
Verifiability of genus-level classification under quantification and parsimony theories: a case study of follicucullid radiolarians
期刊论文
PALEOBIOLOGY, 2020, 卷号: 46, 期号: 3, 页码: 337-355
作者:
Xiao, Yifan
;
Suzuki, Noritoshi
;
He, Weihong
;
Benton, Michael J.
;
Yang, Tinglu
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/12/02
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 卷号: 131, 页码: 55-65
作者:
Zhao, Minghao
;
Hu, Chengyu
;
Song, Xiangfu
;
Zhao, Chuan
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Cloud computing security
Outsourced computing
Verifiability
Privacy
An improved scheme for outsourced computation with attribute-based encryption
会议论文
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), DEC 13-15, 2017
作者:
Yang, Haining
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/31
blind verifiability
cloud computing
KP-ABE
verifiable computation
Efficient pairing-free PRE schemes for multimedia data sharing in IoT
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 页码: 18327-18354
作者:
Hu, Xing
;
Tang, Chunming
;
Wong, Duncan S.
;
Zheng, Xianghan
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/21
Public verifiability
CCA security
Proxy re-encryption
Without pairing
Multimedia data security
An improved scheme for outsourced computation with attribute-based encryption
期刊论文
Concurrency Computation, 2018
作者:
Yang H.
;
Sun J.
;
Qin J.
;
Ma J.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/11
blind verifiability
cloud computing
KP-ABE
verifiable computation
The Public Verifiability of Public Key Encryption with Keyword Search
期刊论文
MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 卷号: 235, 页码: 299-312
作者:
Zhu, Binrui
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/11
Cloud computing
PEKS
Public verifiability
Indistinguishability
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 卷号: 15, 期号: 6, 页码: 1083-1095
作者:
Wan, Zhiguo
;
Deng, Robert H.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Cloud computing
verifiability
keyword search
privacy
Research on symmetric fuzzy search of medical data outsourcing system under intelligent network
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018
作者:
Zhao, Huiqi
;
Chen, Qian
;
Wang, Yinglong
;
Shu, Minglei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/11
Intelligent network
Medical cloud server
Symmetrical model
Verifiability
Medical outsourcing system
Searchable encryption
Index
Security
Trapped door
©版权所有 ©2017 CSpace - Powered by
CSpace