CORC

浏览/检索结果: 共15条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Distributed storage scheme for encryption speech data based on blockchain and IPFS 期刊论文
Journal of Supercomputing, 2022
作者:  Zhang, Qiuyu;  Zhao, Zhenyu
收藏  |  浏览/下载:15/0  |  提交时间:2022/08/09
Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system 期刊论文
Information Sciences, 2019, 卷号: 479, 页码: 567-592
作者:  Yang, Yang;  Zheng, Xianghan;  Guo, Wenzhong;  Liu, Ximeng;  Chang, Victor
收藏  |  浏览/下载:23/0  |  提交时间:2019/11/19
Contexts-States-Aware Access Control for Internet of Things 会议论文
作者:  Dong, Yuji;  Wan, Kaiyu;  Huang, Xin;  Yue, Yong
收藏  |  浏览/下载:23/0  |  提交时间:2019/11/19
Generic construction of role-based encryption in the standard model 期刊论文
International Journal of Security and Networks, 2017, 卷号: 12, 页码: 198-205
作者:  Li, BaoHong;  Li, BaoJun;  Zhao, YinLiang
收藏  |  浏览/下载:4/0  |  提交时间:2019/11/26
Context-based Monitor Framework for Sensors Access in Smartphone 会议论文
3rd IEEE International Conference on Progress in Informatcs and Computing (IEEE PIC), 2015-12-18
作者:  Dai, Jiazhu[1];  Chen, Junyan[2]
收藏  |  浏览/下载:9/0  |  提交时间:2019/04/26
Access control for rural medical and health collaborative working platform 期刊论文
Journal of China Universities of Posts and Telecommunications, 2013, 卷号: 20, 期号: SUPPL -2, 页码: 7-10
作者:  Jiang, Yan-Feng;  Zhang, Si-Yue;  Huang, Zhen;  Liu, Mu-Qing;  Yin, Ling
收藏  |  浏览/下载:5/0  |  提交时间:2016/09/05
Assessing Censorship on Microblogs in China: Discriminatory Keyword Analysis and the Real-Name Registration Policy 期刊论文
IEEE Internet Computing, 2013, 卷号: Vol.17 No.3, 页码: 42-50
作者:  Fu,King-wa;  Chau,Michael;  Chan,Chung-hong
收藏  |  浏览/下载:10/0  |  提交时间:2020/01/04
Based on the attribute encrypted cloud storage scheme 会议论文
Shiyan, Hubei, China, June 21, 2013 - June 23, 2013
作者:  Zhu, Li-Ye
收藏  |  浏览/下载:23/0  |  提交时间:2020/11/15
An efficient attribute-based encryption algorithm for ad hoc networks 期刊论文
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2012, 卷号: 46, 期号: [db:dc_citation_issue], 页码: 33-36
作者:  Gao, Ang;  Li, Zengzhi;  Zhao, Jizhong
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/10
Access control based on group signatures in cloud service 会议论文
作者:  Zheng, Han;  Zhao, Zhongmeng;  Zhang, Xuanping
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/10


©版权所有 ©2017 CSpace - Powered by CSpace