×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [23]
北京航空航天大学 [12]
华南理工大学 [12]
软件研究所 [12]
湖南大学 [10]
北京大学 [8]
更多...
内容类型
期刊论文 [94]
会议论文 [50]
会议 [8]
其他 [6]
学位论文 [3]
专利 [1]
更多...
发表日期
2022 [2]
2021 [3]
2020 [3]
2019 [6]
2018 [22]
2017 [17]
更多...
学科主题
Computer S... [2]
计算机科学技术基础学... [2]
Astronomy ... [1]
天文学 [1]
计算机系统结构::分... [1]
计算机系统结构::计... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共162条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2021, 卷号: 2021
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
;
Fu, Minrui
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2021/12/17
Enforcing Access Control in Information-Centric Edge Networking
期刊论文
IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 卷号: 69, 期号: 1, 页码: 353-364
作者:
Wu, Danye
;
Xu, Zhiwei
;
Chen, Bo
;
Zhang, Yujun
;
Han, Zhu
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2021/12/01
Edge computing
in-network caching
access control
confidentiality-enhanced network coding
Searchable Encryption Cloud Storage with Dynamic Data Update to Support Efficient Policy Hiding
期刊论文
CHINA COMMUNICATIONS, 2020, 卷号: 17, 期号: 6, 页码: 153-163
作者:
Cao, Laicheng
;
Kang, Yifan
;
Wu, Qirui
;
Wu, Rong
;
Guo, Xian
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/03/01
cloud storage
dynamic update
keywords search
policy hidden
AuthPrivacyChain: A Blockchain-Based Access Control Framework With Privacy Protection in Cloud
期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 70604-70615
作者:
Yang, Caixia
;
Tan, Liang
;
Shi, Na
;
Xu, Bolei
;
Cao, Yang
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/12/10
Cloud computing
Authorization
Privacy
Distributed databases
Cloud computing
cloud security
access control
blockchain
privacy protection
A Blockchain-Based Access Control Framework for Cyber-Physical-Social System Big Data
期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 77215-77226
作者:
Tan, Liang
;
Shi, Na
;
Yang, Caixia
;
Yu, Keping
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/12/10
Servers
Cloud computing
Big Data
Iron
Computer architecture
Authorization
CPSS
CPS
access control
blockchain
transaction
ACS-HCA: An Access Control Scheme Under Hierarchical Cryptography Architecture
期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2019, 卷号: 28, 期号: 1
作者:
Shi Jiaoli
;
Huang Chuanhe
;
He Kai
;
Shen Xieyang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/05
Cloud storage
Access control
Ciphertext-policy attribute-based encryption
Hierarchical cryptography architecture
Attribute revocation
Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications
期刊论文
2019, 卷号: 7, 页码: 137594-137607
作者:
Zhang, Qian
;
Wang, Shangping
;
Zhang, Duo
;
Wang, Jifang
;
Zhang, Yaling
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/20
Attribute based encryption
dual access control
time specified encryption
data integrity verification
©版权所有 ©2017 CSpace - Powered by
CSpace