×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [8]
西安交通大学 [5]
山东大学 [3]
北京大学 [2]
地理科学与资源研究所 [2]
清华大学 [1]
更多...
内容类型
期刊论文 [16]
会议论文 [10]
SCI/SSCI论文 [2]
发表日期
2022 [1]
2021 [1]
2019 [3]
2018 [1]
2017 [2]
2016 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共28条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Blockchain data privacy access control based on searchable attribute encryption
期刊论文
Computers, Materials and Continua, 2021, 卷号: 66, 期号: 1, 页码: 871-884
作者:
Feng, Tao
;
Pei, Hongmei
;
Ma, Rong
;
Tian, Youliang
;
Feng, Xiaoqin
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2020/12/18
Access control
Blockchain
Predictive analytics
Privacy by designAccess structure
Authorized users
Data privacy protections
Exposure problem
Hierarchical attributes
Prediction model
Searchable encryptions
Transaction information
The Security Assessment on Programmable Logic Controller based on Attack Tree Model and FAHP
会议论文
Shenyang, China, July 12, 2019 - July 14, 2019
作者:
Feng, Tao
;
Shi, Yanxia
;
Gong, Renbin
;
Zhao, Qianchuan
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2020/11/15
Analytic hierarchy process
Computation theory
Computer circuits
Controllers
Data acquisition
Decision making
Forestry
Intelligent computing
Probability
Programmable logic controllers
Programmed control systems
Security of data
Attack tree
Fuzzy analytic hierarchy process
Industrial control systems
Programmable logic controllers (PLC)
Protective measures
Security attributes
Shapiro-Wilk tests
Supervisory control and data acquisition
Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage
期刊论文
2019, 卷号: 7, 页码: 66655-66667
作者:
Sun, Jin
;
Ren, Lili
;
Wang, Shangping
;
Yao, Xiaomin
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/12/20
Access control
keywords search
data verification
attributes revocation
MPR based secure content routing scheme for NDN-MANET
期刊论文
Journal of Internet Technology, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/14
Authentication
Floods
Forestry
Mobile ad hoc networks
Network security
Trees (mathematics)
Content routing
MANET
Merkle trees
Named data networkings
Security attributes
Security mechanism
Source authentication
Statistical detection
Finding quasi-identifiers for k-anonymity model by the set of cut-vertex
期刊论文
Engineering Letters, 2018, 卷号: 26, 期号: 1, 页码: 150-160
作者:
Yan, Yan
;
Wang, Wanjun
;
Hao, Xiaohong
;
Zhang, Lianxiu
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/11/14
Graph structures
Graphic methods
Publishing
Attributes graph
Cut vertex
K-Anonymity
Privacy Preserving Data Publishing
Quasi identifiers
An analysis of first-time and repeat visitors to Korean national parks from 2007 and 2013
期刊论文
Journal of Mountain Science, 2017, 卷号: 14, 期号: 12, 页码: 2527-2539
作者:
Yunseon CHOE
;
Michael A. SCHUETT
;
Kyu-Won SIM
收藏
  |  
浏览/下载:125/0
  |  
提交时间:2017/12/07
ThIs Paper ExamIned VIsiTors To Bukhansan NatiOnal Park In Korea Based On First-time And Repeat vIsitatiOn. Bukhansan NatiOnal Park Is Korea's Most Heavily vIsited NatiOnal Park With Annual vIsitatiOn Of Six milliOn VIsiTors In 2015. Data Used In ThIs Article Were Collected On-site In The Park In 2007 And 2013 By The Korea NatiOnal Park Service (Knps). The Study Variables Included Socio-demographics
Travel Behavior
Motivation
And Satisfaction With Park Attributes
Services And Facilities. Data Were Analyzed By Each Study Year For First-time And Repeat Visitors. Results Showed Significant Differences For Both First-time And Repeat Visitors.On Several Socio-demographic
Travel Behavior
And Motivation Variables Within Each Study Year. For Satisfaction With Park Attributes
Facilities And Services
First-time VisiTors Were Significantly Different From Repeat VisiTors On Seven Variables For Both Years. implicatiOns Are Given Regarding Programs And Services To Improve visiTor satisfactiOn And Sustain The Natural
Cultural And HisTorical Resources At Bukhansan nAtional Park And Other nAtional Parks In Korea. Future Research Suggestions Are Provided To Learn More About visiTor Characteristics
StAndards Of Quality And Preferences In The National Parks.
Mining parameter information for building extraction and change detection with very high-resolution imagery and GIS data
期刊论文
GISCIENCE & REMOTE SENSING, 2017
Guo, Zhou
;
Du, Shihong
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2017/12/03
parameter mining
GIS data
VHR imagery
building extraction
change detection
REMOTE-SENSING DATA
SCALE PARAMETER
IKONOS IMAGERY
SURFACE MODELS
CLASSIFICATION
SEGMENTATION
SELECTION
MULTIRESOLUTION
ATTRIBUTES
ALGORITHMS
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 卷号: 62, 页码: 112-127
作者:
Xia, Hui
;
Yu, Jia
;
Tian, Cheng-liang
;
Pan, Zhen-kuan
;
Sha, Edwin
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/16
Decentralized trust inference model
Trust attributes
Fuzzy AHP
Light-weight trust-enhanced routing protocol
Data-driven route
maintenance mechanism
Attack resistance
Malicious node detection
Big-Data Based Automatic Decision Matrix for Multiple Attribute Collaborative Decision in B2B Collaboration Context
会议论文
International Conference on Computer Networks and Information Security (CNIS), 2015-01-01
作者:
Liu, Xiang[1]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/26
Multiple attributes collaborative decision
Automatic decision matrix
B2B collaboration
Big-Data
Artificial neural networks
©版权所有 ©2017 CSpace - Powered by
CSpace