×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [13]
内容类型
期刊论文 [10]
会议论文 [3]
发表日期
2019 [4]
2014 [1]
2013 [1]
2012 [1]
2011 [2]
2010 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An anonymous entropy-based location privacy protection scheme in mobile social networks
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019
作者:
Ni, Lina
;
Tian, Fulong
;
Ni, Qinghang
;
Yan, Yan
;
Zhang, Jinquan
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/11
Location privacy protection
Location-based service
k-anonymity
Anonymous entropy
kd-tree
A Secure Authentication Protocol for Internet of Vehicles
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 12047-12057
作者:
Chen, Chien-Ming
;
Xiang, Bin
;
Liu, Yining
;
Wang, King-Hang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Internet of Vehicles
authentication
anonymity
smart card
Reconsidering a lightweight anonymous authentication protocol
期刊论文
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 卷号: 42, 期号: 1, 页码: 9-14
作者:
Chen, Chien-Ming
;
Wang, King-Hang
;
Fang, Weicheng
;
Wu, Tsu-Yang
;
Wang, Eric Ke
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/11
Authenticated key agreement
off-line password guessing attack
user
anonymity
Maximum delay anonymous clustering feature tree based privacy-preserving data publishing in social networks
会议论文
7th International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), OCT 19-21, 2018
作者:
Zhang, Jinquan
;
Zhao, Bowen
;
Song, Guochao
;
Ni, Lina
;
Yu, Jiguo
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/31
Privacy protection
Data publishing
Social networks
(alpha,L)-diversity
K-anonymity
Clustering feature (CF) tree
A general transformation from KP-ABE to searchable encryption
期刊论文
Future generations computer systems: FGCS, 2014, 页码: 107-115
作者:
Han, F.
;
Qin, J.
;
Zhao, H.
;
Hu, J.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/17
ABEKS
KP-ABE
PEKS
Searchable encryption
Weak anonymity
Protocols of location-proof based on WiFi in smart-phone
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2013, 卷号: 24, 期号: SUPPL.2, 页码: 222-228
作者:
Chen, Xiao-Long
;
Qin, Jing
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/23
Anonymity
Location-proof
Pairing
Smart-phone
WiFi
A general transformation from KP-ABE to searchable encryption
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 卷号: 7672 LNCS, 页码: 165-178
作者:
Fei, Han
;
Jing, Qin
;
Huawei, Zhao
;
Hu, Jiankun
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/23
ABEKS
KP-ABE
PEKS
searchable encryption
weak anonymity
Path planning for privacy preserving in location based service
期刊论文
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2011, 2011, 页码: 162-167
作者:
Ji, Guangjun
;
Sun, Yuqing
;
Ma, Xiaojun
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/23
K-anonymity
Location Based Service(LBS)
Location Privacy
Practical anonymous subscription system with privacy preserving data mining
期刊论文
ICSESS 2011 - Proceedings: 2011 IEEE 2nd International Conference on Software Engineering and Service Science, 2011, 页码: 138-141
作者:
Xin, Liu
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/23
anonymity
e-commerce
group signature
privacy preserving data mining
subscription system
Improved hidden identity-based signature scheme
期刊论文
Proceedings - 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010, 2010, 卷号: 1, 页码: 416-421
作者:
Liu, Xin
;
Xu, Qiu-Liang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/26
CCA2-anonymity
Concurrent join
Exculpability
Group signatures
Hidden identity-based signatures
©版权所有 ©2017 CSpace - Powered by
CSpace