×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [6]
北京大学 [2]
兰州理工大学 [2]
上海电子信息职业技术... [2]
清华大学 [1]
兰州大学 [1]
更多...
内容类型
期刊论文 [10]
会议论文 [4]
其他 [1]
发表日期
2022 [1]
2019 [1]
2018 [1]
2017 [1]
2015 [1]
2013 [3]
更多...
学科主题
industrial... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共15条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system
期刊论文
Information Sciences, 2019, 卷号: 479, 页码: 567-592
作者:
Yang, Yang
;
Zheng, Xianghan
;
Guo, Wenzhong
;
Liu, Ximeng
;
Chang, Victor
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/11/19
Access control mechanism
Access control policies
Access control technologies
De duplications
Emergency scenario
Emergency situation
Privacy preserving
Self-Adaptive
Contexts-States-Aware Access Control for Internet of Things
会议论文
作者:
Dong, Yuji
;
Wan, Kaiyu
;
Huang, Xin
;
Yue, Yong
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/11/19
Access control policies
Attribute based access control
Extensible access control markup languages
Internet of Things (IOT)
Reference architecture
Role-based Access Control
Semantic Web rule language (SWRL)
Semantic Web technology
Generic construction of role-based encryption in the standard model
期刊论文
International Journal of Security and Networks, 2017, 卷号: 12, 页码: 198-205
作者:
Li, BaoHong
;
Li, BaoJun
;
Zhao, YinLiang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
Access control policies
Adaptive security
Ciphertexts
Cloud storages
Inner product
Partial order relation
Role hierarchy
Role-based
Role-based Access Control
User revocation
Context-based Monitor Framework for Sensors Access in Smartphone
会议论文
3rd IEEE International Conference on Progress in Informatcs and Computing (IEEE PIC), 2015-12-18
作者:
Dai, Jiazhu[1]
;
Chen, Junyan[2]
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/04/26
context-based access control
sensor
privacy
android
policies
Access control for rural medical and health collaborative working platform
期刊论文
Journal of China Universities of Posts and Telecommunications, 2013, 卷号: 20, 期号: SUPPL -2, 页码: 7-10
作者:
Jiang, Yan-Feng
;
Zhang, Si-Yue
;
Huang, Zhen
;
Liu, Mu-Qing
;
Yin, Ling
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2016/09/05
Access control policies
Collaborative platform
Collaborative working
Computer aided diagnosis systems
Expert informations
Information processing systems
Personal health record
Strong securities
Assessing Censorship on Microblogs in China: Discriminatory Keyword Analysis and the Real-Name Registration Policy
期刊论文
IEEE Internet Computing, 2013, 卷号: Vol.17 No.3, 页码: 42-50
作者:
Fu,King-wa
;
Chau,Michael
;
Chan,Chung-hong
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/01/04
Access
control
Blogs
China
Electronic
mail
Government
policies
Information
filtering
Internet
China
Internet
censorship
Real-Name
Registration
Weibo
microblogging
Based on the attribute encrypted cloud storage scheme
会议论文
Shiyan, Hubei, China, June 21, 2013 - June 23, 2013
作者:
Zhu, Li-Ye
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2020/11/15
Cryptography
Access control models
Access control policies
Ciphertexts
Cloud storage services
Cloud storages
Conspiracy attack
Formatting
Security problems
An efficient attribute-based encryption algorithm for ad hoc networks
期刊论文
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2012, 卷号: 46, 期号: [db:dc_citation_issue], 页码: 33-36
作者:
Gao, Ang
;
Li, Zengzhi
;
Zhao, Jizhong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/10
Access control policies
Attribute-based encryptions
Inverse discrete fourier transforms
Open channels
Secret key
Time complexity
Access control based on group signatures in cloud service
会议论文
作者:
Zheng, Han
;
Zhao, Zhongmeng
;
Zhang, Xuanping
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/10
Access control models
Access control policies
Cloud providers
Cloud service providers
Cloud services
Group signatures
Sensitive informations
User privacy
©版权所有 ©2017 CSpace - Powered by
CSpace