×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [24]
湖南大学 [20]
山东大学 [15]
北京航空航天大学 [14]
大连理工大学 [8]
兰州理工大学 [7]
更多...
内容类型
期刊论文 [109]
会议论文 [7]
其他 [1]
发表日期
2019 [117]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共117条,第1-10条
帮助
限定条件
发表日期:2019
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Algorithm of blockchain data provenance based on ABE
期刊论文
Tongxin Xuebao/Journal on Communications, 2019, 卷号: 40, 期号: 11, 页码: 101-111
作者:
Tian, Youliang
;
Yang, Kedi
;
Wang, Zuan
;
Feng, Tao
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Blockchain
Data privacy
Data Sharing
Information dissemination
Visibility
Attribute-based encryptions
Data provenance
Dynamic protections
Experimental simulations
Ho-momorphic encryptions
Privacy protection
Traceability information
Zero knowledge proof
Towards privacy preserving social recommendation under personalized privacy settings
期刊论文
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2019, 卷号: 22, 期号: 6, 页码: 2853-2881
作者:
Meng, Xuying
;
Wang, Suhang
;
Shu, Kai
;
Li, Jundong
;
Chen, Bo
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/12/10
Differential privacy
Social recommendation
Ranking
Personalized privacy settings
Privacy protection based on many-objective optimization algorithm
期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 卷号: 31, 期号: 20, 页码: 14
作者:
Zhang, Jiangjiang
;
Xue, Fei
;
Cai, Xingjuan
;
Cui, Zhihua
;
Chang, Yu
收藏
  |  
浏览/下载:73/0
  |  
提交时间:2019/12/16
achievement scalarizing function
angle information index
balanceable fitness estimation method
many-objective optimization algorithm
privacy protection
Cloud Storage Scheme on Attribute Blinding Fuzzy Searchable Encryption
期刊论文
Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 卷号: 39, 期号: 7, 页码: 706-713
作者:
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/11/14
Data privacy
Digital storage
Network security
Attribute blinding
Ciphertext-policy attribute-based encryptions
Cloud storages
Pre-decryption
Searchable encryptions
Hierarchical differential privacy hybrid decomposition algorithm for location big data
期刊论文
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 卷号: 22, 页码: S9269-S9280
作者:
Yan, Yan
;
Hao, Xiaohong
;
Zhang, Lianxiu
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2020/06/02
Location big data
Privacy protection
Adaptive density grids
Hybrid decomposition
Differential privacy
Privacy Protection for Blockchains with Account and Multi-Asset Model
期刊论文
CHINA COMMUNICATIONS, 2019, 卷号: 16, 期号: 6, 页码: 69-79
作者:
Li, Kang
;
Sun, Yi
;
Li, Jun
;
Li, Zhongcheng
;
Jia, Linpeng
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2019/08/16
blockchain
privacy protection
zero-knowledge proof algorithm
account and multi-asset model
LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for N-Times Computing Offloading in IoT
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 期号: 3, 页码: 4462-4471
作者:
Guizani, Mohsen
;
Du, Xiaojiang
;
Zhu, Liehuang
;
Xu, Yongjun
;
Wang, Fei
收藏
  |  
浏览/下载:52/0
  |  
提交时间:2019/08/16
Authentication
computing offloading (CO)
Internet of Things (IoT)
privacy preserving
Towards secure industrial iot: Blockchain system with credit-based consensus mechanism
期刊论文
IEEE Transactions on Industrial Informatics, 2019, 卷号: 15, 期号: 6, 页码: 3680-3689
作者:
Zeng P(曾鹏)
;
Huang, Junqin
;
Kong LH(孔令和)
;
Chen, Guihai
;
Wu, Min-You
收藏
  |  
浏览/下载:89/0
  |  
提交时间:2019/06/29
Blockchain
credit-based
directed acyclic graph (DAG)
efficiency
industrial IoT (IIoT)
privacy
proof-of-work (PoW)
security
Towards privacy preservation for "check-in" services in location-based social networks
期刊论文
INFORMATION SCIENCES, 2019, 卷号: 481, 页码: 616-634
作者:
Sun, Gang
;
Song, Liangjun
;
Liao, Dan
;
Yu, Hongfang
;
Chang, Victor
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/11/19
Location-based social networks
Location privacy
Privacy preservation
Check-in services
Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system
期刊论文
Information Sciences, 2019, 卷号: 479, 页码: 567-592
作者:
Yang, Yang
;
Zheng, Xianghan
;
Guo, Wenzhong
;
Liu, Ximeng
;
Chang, Victor
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/11/19
Access control mechanism
Access control policies
Access control technologies
De duplications
Emergency scenario
Emergency situation
Privacy preserving
Self-Adaptive
©版权所有 ©2017 CSpace - Powered by
CSpace