×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
暨南大学 [6]
软件研究所 [6]
华南理工大学 [4]
山东大学 [3]
兰州大学 [2]
浙江工商大学 [2]
更多...
内容类型
会议论文 [30]
发表日期
2017 [1]
2014 [1]
2013 [2]
2011 [1]
2010 [6]
2008 [1]
更多...
学科主题
computer s... [1]
geology; r... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共30条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Toward Proxy Re-Encryption From Learning with Errors in the Exponent
会议论文
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, AUG 01-04, 2017
作者:
Li, Zengpeng
;
Ma, Chunguang
;
Wang, Ding
;
Zhao, Minghao
;
Zhao, Qian
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/31
Proxy Re-Encryption
Key Switching Mechanism
Learning with Errors in
the Exponent
A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage
会议论文
作者:
Cui, Yihui
;
Peng, Zhiyong
;
Song, Wei
;
Li, Xiaojuan
;
Cheng, Fangquan
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/05
cryptographic cloud storage
proxy re-encryption
group key management
Accelerating GPGPU architecture simulation
会议论文
2013 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2013, Pittsburgh, PA
作者:
Yu zhibin
;
Eeckhout Lieven
;
Goswami Nilanjian
;
Li tao
;
John lizy K.
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2015/08/28
Towards a Secure Certificateless Proxy Re-Encryption Scheme
会议论文
7th International Conference on Provable Security (ProvSec), Melaka, MALAYSIA, OCT 23-25, 2013
Guo, Hui
;
Zhang, Zhenfeng
;
Zhang, Jiang
;
Chen, Cheng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2014/12/16
on the security of a bidirectional proxy re-encryption scheme from pkc 2010
会议论文
14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, Taormina, Italy, 6-Mar-02
Weng Jian
;
Zhao Yunlei
;
Hanaoka Goichiro
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2011/10/10
Public key cryptography
Proxy signature scheme secure against chosen key and chosen warrant attacks
会议论文
2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010, Wuhan, Hubei, China, April 24, 2010 - April 25, 2010
作者:
Hu, Guozheng
;
Han, Lansheng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/04
efficient unidirectional proxy re-encryption
会议论文
3rd International Conference on Cryptology in Africa, AFRICACRYPT 2010, Stellenbosch, South africa, May 3, 201
Chow Sherman S. M.
;
Weng Jian
;
Yang Yanjiang
;
Deng Robert H.
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2011/03/31
Network security
attribute-based conditional proxy re-encryption with chosen-ciphertext security
会议论文
53rd IEEE Global Communications Conference, GLOBECOM 2010, Miami, FL, United states, 40883
Zhao Jing
;
Feng Dengguo
;
Zhang Zhenfeng
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2011/03/31
Telecommunication
Research of the multi-uplink high-performance web caching proxy
会议论文
5th International Conference on Pervasive Computing and Applications, ICPCA10, Maribor, Slovenia, December 1, 2010 - December 3, 2010
作者:
Li, Lin
;
Chen, Wenbo
;
Tang, Jun
;
Li, Shanxi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/01/18
Proxy caches
Cache memory
Computer operating systems
Optimization
Ubiquitous computing
Bottleneck problem
Campus network
Key technologies
Multi-uplink caching proxy
Network address translations
Network resource
Network structures
Performance optimizations
Performance potentials
Policy routing
Shared cache
Web browsing
Web caching
Group key management using proxy re-encryption for dynamic networks
会议论文
作者:
Zhang, Minqing
;
Wu, Xuguang
;
Han, Yiliang
;
Yang, Xiaoyuan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/18
Computation efficiency
Distributed protocols
Group management
Key distribution centers
Multi-recipient public key encryption
Proxy re encryptions
Secure multicastg
Wireless communications
©版权所有 ©2017 CSpace - Powered by
CSpace