×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [4]
大连理工大学 [1]
北京航空航天大学 [1]
兰州大学 [1]
中南大学 [1]
上海大学 [1]
更多...
内容类型
期刊论文 [10]
会议论文 [1]
发表日期
2019 [2]
2018 [2]
2015 [1]
2014 [1]
2013 [2]
2011 [1]
更多...
学科主题
computer s... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Influencing factors of horizontal leaders' role identity in projects: A sequential mixed method approach
期刊论文
INTERNATIONAL JOURNAL OF PROJECT MANAGEMENT, 2019, 卷号: 37, 页码: 582-598
作者:
Zhu, Fangwei
;
Wang, Linzhuo
;
Sun, Mouxuan
;
Sun, Xiuxia
;
Mueller, Ralf
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/02
Horizontal leadership
Role identity
Qualitative comparative analysis
Fuzzy-set
Fuzzy matching: multi-authority attribute searchable encryption without central authority
期刊论文
SOFT COMPUTING, 2019, 卷号: 23, 期号: 2, 页码: 527-536
作者:
Zhu, Binrui
;
Sun, Jiameng
;
Qin, Jing
;
Ma, Jixin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/11
Multi-authority
Cloud computing
Searchable encryption
Attribute-based
encryption
Fuzzy identity
Attribute-based fuzzy identity access control in multicloud computing environments
期刊论文
SOFT COMPUTING, 2018, 卷号: 22, 期号: 12
作者:
Li, Wenmin
;
Wen, Qiaoyan
;
Li, Xuelei
;
He, Debiao
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Attribute-based encryption
Fuzzy identity
Data access control
Multicloud computing
Collaboration
Feasibility study on security deduplication of medical cloud privacy data
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018, 卷号: 2018, 期号: 1
作者:
Zhao, Huiqi
;
Wang, Lexia
;
Wang, Yinglong
;
Shu, Minglei
;
Liu, Jimin
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/11
Medical cloud
Convergence encryption
Fuzzy keyword search
Deduplication
Identity token
Message authentication code(MAC)
Generating Implications from One-Variable Functions
期刊论文
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2015, 卷号: 23, 期号: 6, 页码: 927-947
作者:
Su, Yong
;
Xie, Aifang
;
Liu, Hua-Wen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/17
Fuzzy connective
implication
left neutrality property
identity
principle
ordering principle
law of contraposition
modus ponens
modus tollens
Analysis and improvement of a provable secure fuzzy identity-based signature scheme
期刊论文
Science China Information Sciences, 2014, 卷号: 57, 期号: 9, 页码: 1-5
Xiong, Hu (1)
;
Chen, YaNan (4)
;
Zhu, GuoBin (1)
;
Qin, ZhiGuang (1)
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2014/12/16
identity-based cryptosystem
fuzzy identity-based signature
forgery attack
cryptanalysis
bilinear pairings
Secure Symmetric Key Fuzzy Identity-Based Encryption
期刊论文
MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 卷号: 321-324, 页码: 2665-2668
作者:
Liu, Pengtao
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/23
symmetric key
identity-based encryption
fuzzy
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2013, 卷号: 62, 页码: 2266-2277
作者:
Xu, Peng
;
Jin, Hai
;
Wu, Qianhong
;
Wang, Wei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/06
Public-key encryption with keyword search
keyword guessing attack
public-key encryption with fuzzy keyword search
identity-based encryption
Achieving fine‐grained access control for secure data sharing on cloud servers
期刊论文
Concurrency and Computation: Practice and Experience, 2011, 卷号: 23, 期号: 12, 页码: 1443-1464
作者:
Wang, Guojun*
;
Liu, Qin
;
Wu, Jie
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/03
secure storage
cloud computing
precise and fuzzy identity‐based encryption
New Fuzzy Identity-Based Encryption in the Standard Model
期刊论文
INFORMATICA, 2010, 卷号: 21, 页码: 393-407
作者:
Ren, Yanli[1]
;
Gu, Dawu[2]
;
Wang, Shuozhong[3]
;
Zhang, Xinpeng[4]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/30
cryptography
fuzzy identity-based encryption
IND-FID-CCA2 security
standard model
©版权所有 ©2017 CSpace - Powered by
CSpace