×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [15]
软件研究所 [13]
大连理工大学 [8]
山东大学 [6]
安徽大学 [5]
青海师范大学 [5]
更多...
内容类型
会议论文 [84]
发表日期
2018 [3]
2017 [2]
2016 [2]
2015 [4]
2014 [2]
2013 [1]
更多...
学科主题
automation... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共84条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Study on Secret Sharing for SM2 Digital Signature and Its Application
会议论文
14th International Conference on Computational Intelligence and Security (CIS), Hangzhou, PEOPLES R CHINA, NOV 16-19, 2018
作者:
Ding, Fan
;
Long, Yihong*
;
Wu, Peili
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/04
SM2
Secret sharing
Android mobile terminal
An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices
会议论文
LECTURE NOTES IN REAL-TIME INTELLIGENT SYSTEMS (RTIS 2016), 2018-01-01
作者:
Liu, Lihua
;
Wang, Shangping
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/20
Attribute-based encryption
Key-policy
Linear secret sharing scheme
Lattices
Decentralized Digital Certificate Revocation System Based on Blockchain
会议论文
3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018-01-01
作者:
Zhang, Aisong
;
Ma, Xinxin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Artificial intelligence
Distributed computer systems
Information systems
Information use
Application scenario
Certification authorities
Collaborative management
Data synchronization
Decentralized consensus
Digital certificates
Online certificate status protocol
Secret sharing schemes
Blockchain
Efficient (k, n) Secret Sharing Scheme Secure Against k-2 Cheaters
会议论文
作者:
Zhu, Lei
;
Liu, Yanxiao
;
Wang, Yichuan
;
Ji, Wenjiang
;
Hei, Xinhong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
Cheating
Secure
Secret Sharing
Efficient (k, n) Secret Sharing Scheme Secure Against k-2 Cheaters
会议论文
2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017-01-01
作者:
Zhu, Lei
;
Liu, Yanxiao
;
Wang, Yichuan
;
Ji, Wenjiang
;
Hei, Xinhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/20
Secret Sharing
Cheating
Secure
A verifiable E-voting scheme with secret sharing
会议论文
16th IEEE International Conference on Communication Technology, ICCT 2015
作者:
Yuan L.
;
Li M.
;
Guo C.
;
Hu W.
;
Tan X.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/09
Secure Model based on Multi-cloud for Big Data Storage and Query
会议论文
4th International Conference on Advanced Cloud and Big Data (CBD), 2016-01-01
作者:
Yang, Zhendong[1]
;
Wang, Liangmin[2]
;
Song, Xiangmei[3]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/24
database security
multi-cloud
secret sharing
vendor lock-in
cloud availability
A Verifiable E-voting Scheme with Secret Sharing
会议论文
IEEE 16th International Conference on Communication Technology (ICCT), Beijing, PEOPLES R CHINA
作者:
Yuan, Lifeng
;
Li, Mingchu
;
Guo, Cheng
;
Hu, Weitong
;
Tan, Xing
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/09
E-voting
Verifiability
Secret sharing
Accountability
Distribution
A Group Authentication Scheme Supporting Cheating Detection and Identification
会议论文
Ninth International Conference on Frontier of Computer Science and Technology, Dalian, PEOPLES R CHINA, 2015-08-26
作者:
Guo, Cheng
;
Zhuang, Ruhan
;
Yuan, Lifeng
;
Feng, Bin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/09
authentication
secret sharing
group-oriented application
cheating detection
cheater identification
Linear (k, n) secret sharing scheme with cheating detection
会议论文
IEEE International Conference on Computer and Information, Liverpool, UNITED KINGDOM, 2015-10-26
作者:
Liu, Yan-Xiao
;
Wang, Zhi-Xiao
;
Yan, Wen-Yao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/20
©版权所有 ©2017 CSpace - Powered by
CSpace