×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [5]
北京航空航天大学 [3]
湖南大学 [2]
北京大学 [1]
上海大学 [1]
安徽大学 [1]
更多...
内容类型
期刊论文 [10]
会议论文 [4]
其他 [1]
发表日期
2016 [15]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
限定条件
发表日期:2016
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
其他
2016-01-01
Wang, Ding
;
Gu, Qianchen
;
Cheng, Haibo
;
Wang, Ping
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Two-factor authentication
Smart card loss attack
Two-factor security
De-synchronization attack
Measurement
MEDICINE INFORMATION-SYSTEMS
SMART-CARDS
PASSWORD AUTHENTICATION
USER AUTHENTICATION
ROBUST
PROTOCOL
ANONYMITY
NETWORKS
User privacy protection for a mobile commerce alliance
期刊论文
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2016, 卷号: 18, 页码: 58-70
Piao, CH
;
Li, XY
;
Pan, X
;
Zhang, CY
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2016/12/09
Anonymity model
Location-based services
Mobile commerce
Personalized privacy profile
Privacy-preserving algorithm
Privacy requirements
Service framework
User privacy protection
Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.
期刊论文
Sensors (Basel), 2016, 卷号: Vol.16 No.12
作者:
Wang,Liangmin
;
Xie,Qingqing
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/22
ATTRIBUTE-BASED ENCRYPTION
HOMOMORPHIC ENCRYPTION
ANONYMITY
Fuzzy Set based Data Publishing For Privacy Preservation
会议论文
17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2016-05-30
作者:
Xie, Meng-bo[1]
;
Qian, Quan[2]
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/26
privacy preservation
fuzzy sets
k-anonymity
An energy-efficient source-anonymity protocol in surveillance systems
会议论文
作者:
Niu, Xiaoguang
;
Zhang, Yihao
;
Yao, Yalan
;
Chen, Xu
;
Jornet, Josep Miquel
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Source-location anonymity
Dynamic mix-ring
Global attacker
Degree of anonymity
Surveillance system
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
期刊论文
IET COMMUNICATIONS, 2016, 卷号: 10, 期号: 14
作者:
He, Debiao
;
Wang, Huaqun
;
Khan, Muhammad Khurram
;
Wang, Lina
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
public key cryptography
smart power grids
smart meters
power system reliability
power system security
telecommunication security
lightweight anonymous key distribution scheme
smart grid
elliptic curve cryptography
reliability
secret key distribution scheme
communication security
smart meter anonymity
identity-based cryptography
AKD scheme
mutual authentication
communication costs
A privacy preserving three-factor authentication protocol for e-Health clouds
期刊论文
JOURNAL OF SUPERCOMPUTING, 2016, 卷号: 72, 期号: 10
作者:
Jiang, Qi
;
Khan, Muhammad Khurram
;
Lu, Xiang
;
Ma, Jianfeng
;
He, Debiao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Authentication
Password
Biometrics
Anonymity
Privacy
E-Health
Cloud computing
Traversing Bitcoin's P2P network: insights into the structure of a decentralised currency
期刊论文
International Journal of Computational Science and Engineering, 2016, 卷号: Vol.13 No.2, 页码: 122-131
作者:
MartinWerner
;
MircoSchönfeld
;
SebastianFeld
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/24
peer-to-peer
networks
P2P
networks
Bitcoin
autonomous
systems
electronic
cash
e-cash
digital
currency
privacy
k-anonymity
resilience
information
propagation
decentralised
currencies
peer
announcement.
A gamma-Strawman privacy-preserving scheme in weighted social networks
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 期号: 18
作者:
Yuan, Quan
;
Du, Ruiying
;
Chen, Jing
;
Zhang, Bowen
;
Chen, Min
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
weighted social networks
anonymity
greedy algorithm
privacy preservation
An energy-efficient source-anonymity protocol in surveillance systems
期刊论文
PERSONAL AND UBIQUITOUS COMPUTING, 2016, 卷号: 20, 期号: 5
作者:
Niu, Xiaoguang
;
Zhang, Yihao
;
Yao, Yalan
;
Chen, Xu
;
Jornet, Josep Miquel
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Source-location anonymity
Dynamic mix-ring
Global attacker
Degree of anonymity
Surveillance system
©版权所有 ©2017 CSpace - Powered by
CSpace