×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [14]
内容类型
会议 [14]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共14条,第1-10条
帮助
限定条件
内容类型:会议
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Leakage-Resilient anonymous identity-based broadcast encryption in the standard model (EI收录)
会议
Zhangjiajie, China,
作者:
Zhang, Leyou[1]
;
Wang, Zhuanning[1]
;
Wu, Qing[2]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/11
Computer architecture
Parallel architectures
Security of data
Two approaches to build UOV variants with shorter private key and faster signature generation (EI收录)
会议
Beijing, China,
作者:
Tan, Yang[1]
;
Tang, Shaohua[1]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/11
Cryptography
Public key cryptography
Security of data
Fast implementation of simple matrix encryption scheme on modern x64 CPU (EI收录)
会议
Zhangjiajie, China,
作者:
Peng, Zhiniang[1]
;
Tang, Shaohua[1]
;
Chen, Ju[1]
;
Wu, Chen[1]
;
Zhang, Xinglin[1]
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/11
Outages
Probability
Public key cryptography
Security of data
Security systems
Secure Data Outsourcing with Adversarial Data Dependency Constraints (EI收录)
会议
New York, NY, United states,
作者:
Dong, Boxiang[1]
;
Wang, Wendy[1]
;
Yang, Jie[2]
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/04/11
Cloud computing
Cryptography
Finite difference method
Heuristic algorithms
Heuristic methods
Human computer interaction
Information management
Optimization
Outsourcing
Security of data
A security analysis of automated Chinese turing tests (EI收录)
会议
Los Angeles, CA, United states,
作者:
Algwil, Abdalnaser[1]
;
Ciresan, Dan[2]
;
Liu, Beibei[3]
;
Yan, Jeff[1]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/11
Neural networks
Security of data
Security systems
Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation (EI收录)
会议
Xi'an, China,
作者:
Zhang, Kai[1,2]
;
Gong, Junqing[3]
;
Tang, Shaohua[4]
;
Chen, Jie[1,2]
;
Li, Xiangxue[1]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/11
Security of data
Generic anonymous identity-based broadcast encryption with chosen-ciphertext security (EI收录)
会议
Melbourne, VIC, Australia,
作者:
He, Kai[1,2]
;
Weng, Jian[1]
;
Au, Man Ho[3]
;
Mao, Yijun[4,5]
;
Deng, Robert H.[6]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/11
Public key cryptography
Radio broadcasting
Radio communication
Robustness (control systems)
Security of data
Signal receivers
Research on the object recognition of minimum living standard security system based on neural network (EI收录)
会议
Wuxi, Jiangsu, China,
作者:
Deng, Huali[1]
;
Zhang, Liangjun[2]
;
He, Zhenwei[3]
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/04/11
Artificial intelligence
Data mining
Efficiency
Neural networks
Object recognition
Security systems
An authentication data structure of provable data possession with dynamic data operation in cloud computing (EI收录)
会议
Zhangjiajie, China,
作者:
Xu, Hongyun[1]
;
Jiang, Jiesi[1]
;
Xu, Cheng[1]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/11
Authentication
Binary trees
Bins
Cloud computing
Data structures
Security of data
Trees (mathematics)
Virtual storage
Cryptanalysis of a public key cryptosystem based on diophantine equations via weighted LLL reduction (EI收录)
会议
Tokyo, Japan,
作者:
Ding, Jintai[1]
;
Kudo, Momonari[2]
;
Okumura, Shinya[3]
;
Takagi, Tsuyoshi[4]
;
Tao, Chengdong[5]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/11
Polynomial approximation
Public key cryptography
Security of data
Security systems
©版权所有 ©2017 CSpace - Powered by
CSpace