×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [20]
内容类型
期刊论文 [15]
会议论文 [5]
发表日期
2018 [3]
2017 [2]
2015 [2]
2014 [1]
2013 [1]
2012 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共20条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Mechanical Property and Electromagnetic Interference Shielding Effectiveness of Mortar Produced with Radiation-Proof Cloths
期刊论文
JOURNAL OF MATERIALS IN CIVIL ENGINEERING, 2018, 卷号: 30, 期号: 3
作者:
Yue, Hongya
;
Zhang, Hongbo
;
Mao, Honglu
;
Song, Xiuguang
;
Ge, Zhi
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/11
Radiation-proof cloths
Electrical resistivity
Shielding effectiveness
Mechanical property
An ORAM-based privacy preserving data sharing scheme for cloud storage
期刊论文
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 卷号: 39, 页码: 1-9
作者:
Yuan, Dandan
;
Song, Xiangfu
;
Xu, Qiuliang
;
Zhao, Minghao
;
Wei, Xiaochao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Data share
Oblivious random access memory (ORAM)
Access pattern
Shuffle correctness proof
Chinese herbal medicine formula for acute asthma: A multi-center, randomized, double-blind, proof-of-concept trial
期刊论文
RESPIRATORY MEDICINE, 2018, 卷号: 140, 页码: 42-49
作者:
Zhang, Hong Ping
;
Wang, Lei
;
Wang, Zhen
;
Xu, Xian Rong
;
Zhou, Xian Mei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Chinese herbal medicine formula
Acute asthma
Randomized controlled
trial
Inflammatory cytokines
Proof-of-concept
k-out-of-n Oblivious transfer protocol with security against malicious adversaries
期刊论文
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2017, 卷号: 32, 期号: 2, 页码: 81-91
作者:
Wei, Xiaochao
;
Xu, Qiuliang
;
Tang, Yi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/12
k-out-of-n oblivious transfer
full simulation
proof of partial
knowledge
dual-mode cryptosystem
Decisional Diffie-Hellman assumption
An Efficient CPA-Secure Encryption Scheme with Equality Test
期刊论文
Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017, 2017, 卷号: 2, 页码: 38-45
作者:
Jiang, Han
;
Xu, Qiuliang
;
Liu, Changyuan
;
Liu, Zhe
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/12
Encryption scheme with equality test
Homomorphic encryption
IND-CPA security
Zero knowledge proof
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption
期刊论文
International Journal of Embedded Systems, 2015, 卷号: 7, 期号: 43163, 页码: 216-229
作者:
Hu, Chengyu
;
Yu, Zuoxia
;
Yang, Rupeng
;
Xu, Qiuliang
;
Zhou, Yongbin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/17
Extractable hash proof system
Key encapsulation
Side-channel attacks
Weak leakage-resilient
Moisture-proof and Enhanced Effect of Inorganic Coating on Porous Si_3N_4 Ceramic
期刊论文
Journal of Wuhan University of Technology(Materials Science Edition), 2015, 卷号: 30, 期号: 2, 页码: 311-314
作者:
Cheng CB(程传兵)
;
FAN Runhua
;
WANG Chonghai
;
WANG Hongsheng
;
ZHOU Changling
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/17
inorganic coating
Si3N4 ceramic
moisture-proof and enhanced coating
polymer derived
radome
Determination of rational coal and rock pillars height of coal mining under the loose aquifer
会议论文
Taishan Academic Forum - Project on Mine Disaster Prevention and Control, OCT 17-20, 2014
作者:
Wang Jianhu
;
Shao Mingxi
;
Shang Yanfeng
;
Cao Siwen
;
Zhang Xin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
coal-mining
aquifer
water-proof pillars
sand-proof pillars
Protocols of location-proof based on WiFi in smart-phone
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2013, 卷号: 24, 期号: SUPPL.2, 页码: 222-228
作者:
Chen, Xiao-Long
;
Qin, Jing
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/23
Anonymity
Location-proof
Pairing
Smart-phone
WiFi
The Deniability Analysis for a Deniable Authentication Protocol
期刊论文
MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 卷号: 195-196, 页码: 992-997
作者:
Wei, Dawei
;
Liu, Wei
;
Zhao, Xiufeng
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/23
hash proof systme
subset member problem
subset witness assumption
deniable authenticaton
deniability
©版权所有 ©2017 CSpace - Powered by
CSpace