×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [5]
上海电子信息职业技术... [5]
大连理工大学 [4]
北京航空航天大学 [4]
武汉大学 [3]
湖南大学 [3]
更多...
内容类型
期刊论文 [19]
会议论文 [11]
会议 [1]
学位论文 [1]
发表日期
2019 [6]
2018 [3]
2017 [5]
2016 [1]
2015 [1]
2014 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共32条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
An alternative approach to public cloud data auditing supporting data dynamics
期刊论文
Soft Computing, 2019, 卷号: 23, 期号: 13, 页码: 4939-4953
作者:
Wang, Tao
;
Yang, Bo*
;
Liu, Hongyu
;
Yu, Yong
;
Qiu, Guoyong
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2019/12/04
Provable data possession
Cloud data auditing
Verifiable data outsourcing
Standard model
PPM: Privacy Protection Method for Outsourcing Data Entry
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 29745-29753
作者:
Li, Fengqi
;
Shang, Chunli
;
Liu, Kemeng
;
Pang, Aidi
;
Huang, Sikai
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/02
Image segmentation
outsourcing data entry
privacy protection
privacy association separation
sub-image allocation
Privacy preserving weighted similarity search scheme for encrypted data
期刊论文
IET INFORMATION SECURITY, 2019, 卷号: 13, 页码: 61-69
作者:
Guo, Cheng
;
Tian, Pengxu
;
Chang, Chin-Chen
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/02
cryptography
outsourcing
cloud computing
data privacy
different weighted searches
encrypted data
searchable symmetric encryption
data users
search request
homomorphic encryption
weight problem
weight information
weighted similarity search scheme
cloud computing
outsourced data
privacy concerns
searchable encryption
different users
different requirements
Efficient Authentication of Multi-Dimensional Top-$k$Queries
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 4748-4762
作者:
Xiaoyu Zhu
;
Jie Wu
;
Wei Chang
;
Guojun Wang
;
Qin Liu
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/13
Authentication
Servers
Cloud
computing
Databases
Diabetes
Computational
modeling
Data
outsourcing
multi-dimension
query
authentication
signature
chain
top-kquery
Efficient Authentication of Multi-Dimentional Top-k Queries
期刊论文
IEEE ACCESS, 2019, 卷号: Vol.7, 页码: 4748-4762
作者:
Zhu, XY
;
Wu, J
;
Chang, W
;
Wang, GJ
;
Liu, Q
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/17
Data outsourcing
multi-dimension
query authentication
signature chain
top-k query
Securing messaging services through efficient signcryption with designated equality test
期刊论文
INFORMATION SCIENCES, 2019, 卷号: 490, 页码: 146-165
作者:
Wang, Yujue
;
Pang, HweeHwa
;
Deng, Robert H.
;
Ding, Yong
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Messaging system
Encryption
Confidentiality
Authentication
Signcryption
Equality test on ciphertexts
Equijoin
Data outsourcing
P 3 GQ: A practical privacy-preserving generic location-based services query scheme
期刊论文
Pervasive and Mobile Computing, 2018, 卷号: Vol.51, 页码: 56-72
作者:
Haifeng Qian
;
Ming Zeng
;
Jie Chen
;
Kai Zhang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/24
Location-based
services
Privacy-preserving
Data
outsourcing
Encrypted
data
Cloud
storage
Outsourced Biometric Identification With Privacy
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 卷号: 13, 期号: 10
作者:
Hu, Shengshan
;
Li, Minghui
;
Wang, Qian
;
Chow, Sherman S. M.
;
Du, Minxin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Biometric identification
data outsourcing
privacy
somewhat homomorphic encryption
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures
期刊论文
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 卷号: 11, 页码: 235-251
作者:
Wang, Yujue
;
Wu, Qianhong
;
Qin, Bo
;
Chen, Xiaofeng
;
Huang, Xinyi
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
Cloud storage
Data outsourcing
Proofs of storage
Provable data possession
Proofs of retrievability
Public auditability
A confidentiality preserving publicly verifiable computation for multivariate polynomials
期刊论文
Proceedings - 2017 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2017, 2017, 页码: 5-12
作者:
Jiameng, Sun
;
Binrui, Zhu
;
Jing, Qin
;
Jixin, Ma
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/12
Big Data
Cloud computing
High degree polynomial
Outsourcing computation
©版权所有 ©2017 CSpace - Powered by
CSpace