×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [103]
内容类型
会议论文 [84]
会议 [14]
期刊论文 [5]
发表日期
2017 [1]
2016 [1]
2015 [3]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共103条,第1-10条
帮助
限定条件
专题:华南理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems (EI收录)
期刊论文
IEEE Access, 2017, 卷号: 5, 页码: 393-405
作者:
Li, Xiaoyu[1]
;
Tang, Shaohua[1]
;
Xu, Lingling[1]
;
Wang, Huaqun[2]
;
Chen, Jie[3]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/24
Access control
Digital storage
Security of data
Oblivious transfer with fine grained access control from ciphertext policy attribute based encryption in the standard model (EI收录)
期刊论文
International Journal of Future Generation Communication and Networking, 2016, 卷号: 9, 页码: 285-302
作者:
Fu, Xingbing[1]
;
Li, Fagen[1]
;
Zeng, Shengke[2]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/24
Access control
Computer circuits
Data privacy
Security of data
Efficient inference in a generalized partially linear model with random effect for longitudinal data (EI收录SCI收录)
期刊论文
Communications in Statistics - Theory and Methods, 2015, 卷号: 44, 页码: 241-260
作者:
Li, Wanbin[1,2]
;
Xue, Liugen[1]
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/04/25
Intelligent systems
Mathematical models
Monte Carlo methods
Random processes
Sampling
Security of data
Multiple impossible differential cryptanalysis on reduced FOX (EI收录SCI收录)
期刊论文
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015, 卷号: E98A, 页码: 906-911
作者:
Li, Xinran[1,2]
;
Fu, Fang-Wei[2]
;
Guang, Xuan[3]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/25
Lyapunov methods
Security of data
A novel group key transfer for big data security (EI收录SCI收录)
期刊论文
Applied Mathematics and Computation, 2015, 卷号: 249, 页码: 436-443
作者:
Hsu, Chingfang[1]
;
Zeng, Bing[2]
;
Zhang, Maoyuan[1]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/25
Computational complexity
Cryptography
Information theory
Security of data
Network security management based on data fusion technology (EI收录)
会议论文
2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design, CAIDC, Hangzhou, China, November 17, 2006 - November 19, 2006
作者:
Niu, Yi[1,3]
;
Zheng, Qi-Lun[2]
;
Peng, Hong[2]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/18
Computer networks
Conceptual design
Data fusion
Design
Feedforward neural networks
Fusion reactions
Industrial engineering
Industrial management
Information fusion
Internet
Intrusion detection
Network management
Network security
Nuclear physics
Product design
Programmable logic controllers
Radial basis function networks
Sensor networks
The application of chaos and DWT in image scrambling (EI收录)
会议论文
Proceedings of the 2006 International Conference on Machine Learning and Cybernetics, Dalian, China, August 13, 2006 - August 16, 2006
作者:
Gu, Guo-Sheng[1]
;
Han, Guo-Qiang[1]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/18
Algorithms
Chaos theory
Security of data
Wavelet transforms
An image encryption scheme based on chaotic systems (EI收录)
会议论文
Proceedings of the 2006 International Conference on Machine Learning and Cybernetics, Dalian, China, August 13, 2006 - August 16, 2006
作者:
Xiao, Huang-Pei[1]
;
Zhang, Guo-Ji[2]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/18
Chaotic systems
Computer simulation
Function evaluation
Matrix algebra
Numerical methods
Security of data
Reliable and energy-efficient data collection modelling in wireless sensor networks (EI收录)
会议论文
Proceedings - 2005 International Conference on Wireless Communications, Networking and Mobile Computing, WCNM 2005, Wuhan, China, September 23, 2005 - September 26, 2005
作者:
Li, Huifang[1]
;
Jiang, Shengming[1]
;
Wei, Gang[1]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/18
Data handling
Energy utilization
Information retrieval
Mathematical models
Security of data
Sensors
Wireless telecommunication systems
Security operation center design based on, D-S evidence theory (CPCI-S收录)
会议论文
IEEE ICMA 2006: Proceeding of the 2006 IEEE International Conference on Mechatronics and Automation, Vols 1-3, Proceedings
作者:
Hu, Xuanzi
;
Xie, Cunxi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/18
network security
multi-sensor data fusion
D-S evidence theory
security operation center
©版权所有 ©2017 CSpace - Powered by
CSpace