CORC

浏览/检索结果: 共103条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems (EI收录) 期刊论文
IEEE Access, 2017, 卷号: 5, 页码: 393-405
作者:  Li, Xiaoyu[1];  Tang, Shaohua[1];  Xu, Lingling[1];  Wang, Huaqun[2];  Chen, Jie[3]
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/24
Oblivious transfer with fine grained access control from ciphertext policy attribute based encryption in the standard model (EI收录) 期刊论文
International Journal of Future Generation Communication and Networking, 2016, 卷号: 9, 页码: 285-302
作者:  Fu, Xingbing[1];  Li, Fagen[1];  Zeng, Shengke[2]
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/24
Efficient inference in a generalized partially linear model with random effect for longitudinal data (EI收录SCI收录) 期刊论文
Communications in Statistics - Theory and Methods, 2015, 卷号: 44, 页码: 241-260
作者:  Li, Wanbin[1,2];  Xue, Liugen[1]
收藏  |  浏览/下载:7/0  |  提交时间:2019/04/25
Multiple impossible differential cryptanalysis on reduced FOX (EI收录SCI收录) 期刊论文
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2015, 卷号: E98A, 页码: 906-911
作者:  Li, Xinran[1,2];  Fu, Fang-Wei[2];  Guang, Xuan[3]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/25
A novel group key transfer for big data security (EI收录SCI收录) 期刊论文
Applied Mathematics and Computation, 2015, 卷号: 249, 页码: 436-443
作者:  Hsu, Chingfang[1];  Zeng, Bing[2];  Zhang, Maoyuan[1]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/25
Network security management based on data fusion technology (EI收录) 会议论文
2006 7th International Conference on Computer-Aided Industrial Design and Conceptual Design, CAIDC, Hangzhou, China, November 17, 2006 - November 19, 2006
作者:  Niu, Yi[1,3];  Zheng, Qi-Lun[2];  Peng, Hong[2]
收藏  |  浏览/下载:1/0  |  提交时间:2019/04/18
The application of chaos and DWT in image scrambling (EI收录) 会议论文
Proceedings of the 2006 International Conference on Machine Learning and Cybernetics, Dalian, China, August 13, 2006 - August 16, 2006
作者:  Gu, Guo-Sheng[1];  Han, Guo-Qiang[1]
收藏  |  浏览/下载:1/0  |  提交时间:2019/04/18
An image encryption scheme based on chaotic systems (EI收录) 会议论文
Proceedings of the 2006 International Conference on Machine Learning and Cybernetics, Dalian, China, August 13, 2006 - August 16, 2006
作者:  Xiao, Huang-Pei[1];  Zhang, Guo-Ji[2]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/18
Reliable and energy-efficient data collection modelling in wireless sensor networks (EI收录) 会议论文
Proceedings - 2005 International Conference on Wireless Communications, Networking and Mobile Computing, WCNM 2005, Wuhan, China, September 23, 2005 - September 26, 2005
作者:  Li, Huifang[1];  Jiang, Shengming[1];  Wei, Gang[1]
收藏  |  浏览/下载:1/0  |  提交时间:2019/04/18
Security operation center design based on, D-S evidence theory (CPCI-S收录) 会议论文
IEEE ICMA 2006: Proceeding of the 2006 IEEE International Conference on Mechatronics and Automation, Vols 1-3, Proceedings
作者:  Hu, Xuanzi;  Xie, Cunxi
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/18


©版权所有 ©2017 CSpace - Powered by CSpace