×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [24]
北京大学 [15]
清华大学 [11]
计算技术研究所 [6]
厦门大学 [5]
兰州理工大学 [4]
更多...
内容类型
期刊论文 [52]
其他 [13]
会议论文 [12]
学位论文 [6]
发表日期
2021 [5]
2020 [1]
2019 [1]
2018 [3]
2017 [2]
2016 [4]
更多...
学科主题
Computer S... [2]
Biodiversi... [1]
Computer S... [1]
Computer S... [1]
Telecommun... [1]
计算机科学技术基础学... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共83条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
A blockchain-assisted framework for secure and reliable data sharing in distributed systems
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 卷号: 2021, 期号: 1, 页码: 19
作者:
Guo, Yu
;
Wang, Shenling
;
Huang, Jianhui
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2021/12/01
Dynamic searchable encryption
Distributed data storage
Forward security
Smart contract
Blockchain
Secure Data Exchange in M-Learning Platform using Adaptive Tunicate Slime-Mold-Based Hybrid Optimal Elliptic Curve Cryptography
期刊论文
APPLIED SCIENCES-BASEL, 2021, 卷号: 11, 期号: 12, 页码: 1-21
作者:
Aldabbagh, G (Aldabbagh, Ghadah)[ 1 ]
;
Alghazzawi, DM (Alghazzawi, Daniyal M.)[ 1 ]
;
Hasan, SH (Hasan, Syed Hamid)[ 1 ]
;
Alhaddad, M (Alhaddad, Mohammed)[ 1 ]
;
Malibari, A (Malibari, Areej)[ 1 ]
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2021/07/14
mobile learningcloud storagehybrid optical elliptic curve cryptographyadaptive tunicate slime moldencryptiondecryptionsecurity
Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption
期刊论文
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 卷号: 66, 期号: 1, 页码: 871-884
作者:
Feng, Tao
;
Pei, Hongmei
;
Ma, Rong
;
Tian, Youliang
;
Feng, Xiaoqin
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2021/03/12
Blockchain
privacy protection
attribute encryption
access control
searchable-encryption
Blockchain data privacy access control based on searchable attribute encryption
期刊论文
Computers, Materials and Continua, 2021, 卷号: 66, 期号: 1, 页码: 871-884
作者:
Feng, Tao
;
Pei, Hongmei
;
Ma, Rong
;
Tian, Youliang
;
Feng, Xiaoqin
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/12/18
Access control
Blockchain
Predictive analytics
Privacy by designAccess structure
Authorized users
Data privacy protections
Exposure problem
Hierarchical attributes
Prediction model
Searchable encryptions
Transaction information
Secure V2X Communication Network based on Intelligent PKI and Edge Computing
期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 2, 页码: 172-178
作者:
Qiu, Han
;
Qiu, Meikang
;
Lu, Ruqian
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/12/10
Vehicle-to-everything
Servers
Security
Edge computing
Prediction algorithms
Autonomous vehicles
Spatiotemporal variation in PM2.5 concentrations and their relationship with socioeconomic factors in China's major cities
期刊论文
ENVIRONMENT INTERNATIONAL, 2019, 卷号: 133, 页码: -
作者:
Zhao, Xiuling
;
Zhou, Weiqi
;
Han, Lijian
;
Locke, Dexter
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2020/09/09
PM2.5 concentrations
Environmental Kuznets curve
Socioeconomic factors
Spatial autocorrelation
Four new records of caridean shrimp (Crustacea: Decapoda: Caridea) from the East China Sea and South China Sea
期刊论文
ACTA OCEANOLOGICA SINICA, 2018, 卷号: 37, 期号: 10, 页码: 212-217
作者:
Gan Zhibin
;
Li Xinzheng
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/05/15
new record
Lysmata kempi
Lysmata lipkei
Chlorocurtis jactans
Rhynchocinetes conspiciocellus
China seas
Using field-based entomological research to promote awareness about forest ecosystem conservation
期刊论文
NATURE CONSERVATION-BULGARIA, 2018, 期号: 29, 页码: 39-56
作者:
Lamarre, Greg P. A.
;
Juin, Yohan
;
Lapied, Emmanuel
;
Le Gall, Philippe
;
Nakamura, Akihiro
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2018/11/02
Conservation Awareness
Forest Ecosystem
Ethiopia
Biological Education
Des Insectes Et Des Hommes
Public Outreach
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis
期刊论文
IET INFORMATION SECURITY, 2018, 卷号: 12, 页码: 389-397
作者:
Lu, Jiqiang
;
Yap, Wun-She
;
Wei, Yongzhuang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
public key cryptography
private key cryptography
ISO standards
full MISTY1 block cipher
related-key amplified boomerang cryptanalysis
block size
master key
ISO international standard
Japanese CRYPTREC-recommended e-government cipher
European NESSIE selected cipher
cryptographic weakness
data complexity
time complexity
2(87)
33 encryptions
2(60)
5 chosen plaintexts
2(90) weak keys
©版权所有 ©2017 CSpace - Powered by
CSpace