CORC

浏览/检索结果: 共19条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A non-interactive verifiable computation model of perceptual layer data based on CP-ABE 会议论文
Guangzhou, China, January 14-16, 2022
作者:  Zhao JM(赵剑明);  Miao, Weiwei;  Zeng, Zeng
收藏  |  浏览/下载:14/0  |  提交时间:2022/04/13
An improved scheme for outsourced computation with attribute-based encryption 会议论文
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), DEC 13-15, 2017
作者:  Yang, Haining;  Sun, Jiameng;  Qin, Jing;  Ma, Jixin
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/31
An IBE Scheme with Verifiable Outsourced Key Generation Based on a Single Server 期刊论文
IETE TECHNICAL REVIEW, 2018, 卷号: 35, 页码: 97-105
作者:  Xue, Ting[1];  Ren, Yanli[2];  Feng, Guorui[3]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/22
Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server 期刊论文
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, 卷号: E101A, 页码: 608-611
作者:  Dong, Min[1];  Ren, Yanli[2];  Feng, Guorui[3]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/22
An improved scheme for outsourced computation with attribute-based encryption 期刊论文
Concurrency Computation, 2018
作者:  Yang H.;  Sun J.;  Qin J.;  Ma J.
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/11
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing 期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 卷号: 11, 页码: 3648-3663
作者:  Dong, Min[1];  Ren, Yanli[2];  Zhang, Xinpeng[3]
收藏  |  浏览/下载:1/0  |  提交时间:2019/04/24
Confidentiality-Preserving Publicly Verifiable Computation 期刊论文
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 卷号: 28, 期号: 6, 页码: 799-818
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/12
Confidentiality-Preserving Publicly Verifiable Computation 会议论文
10th International Conference on Provable Security (ProvSec), Nanjing Univ Finance & Econ, Nanjing, PEOPLES R CHINA, 2017-09-01
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Confidentiality-Preserving Publicly Verifiable Computation 期刊论文
10th International Conference on Provable Security (ProvSec), 2017, 卷号: 28, 页码: 799-818
作者:  Sun, Jiameng;  Zhu, Binrui;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Identity-Based Encryption with Verifiable Outsourced Revocation 期刊论文
COMPUTER JOURNAL, 2016, 卷号: 59, 页码: 1659-1668
作者:  Ren, Yanli[1];  Ding, Ning[2];  Zhang, Xinpeng[3];  Lu, Haining[4];  Gu, Dawu[5]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/26


©版权所有 ©2017 CSpace - Powered by CSpace