×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [33]
湖南大学 [32]
北京大学 [19]
西安交通大学 [17]
北京航空航天大学 [16]
山东大学 [13]
更多...
内容类型
期刊论文 [145]
会议论文 [44]
其他 [9]
会议 [1]
发表日期
2021 [2]
2020 [2]
2019 [13]
2018 [28]
2017 [28]
2016 [15]
更多...
学科主题
Electrical... [1]
Engineerin... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共199条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A weighted K-member clustering algorithm for K-anonymization
期刊论文
COMPUTING, 2021, 卷号: 103, 期号: 10, 页码: -
作者:
Yan, Yan
;
Herman, Eyeleko Anselme
;
Mahmood, Adnan
;
Feng, Tao
;
Xie, Pengshou
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2021/03/12
Privacy by design
Publishing
Statistics
Clustering effect
Clustering process
Data release
Experimental analysis
Information loss
K-Anonymity
K-anonymization
Privacy Preserving Data Publishing
Multi-Candidate Voting Model Based on Blockchain
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 12, 页码: 1891-1900
作者:
Dongliang Xu
;
Wei Shi
;
Wensheng Zhai
;
Zhihong Tian
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2021/09/03
Blockchain
multi-candidate voting model
voting
voting anonymity confusion algorithm
Location Privacy Protection Algorithm Based on the Division Method of Voronoi in the Internet of Vehicles
会议论文
Hohhot, China, July 17, 2020 - July 20, 2020
作者:
Xie, Peng-shou
;
Han, Xue-ming
;
Feng, Tao
;
Yan, Yan
;
Ma, Guo-qiang
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2020/11/15
Artificial intelligence
Data privacy
Fuzzy sets
Road vehicles
Roads and streets
Vehicle to vehicle communications
Fuzzy algorithms
K-Anonymity
L diversities
Location privacy protection
Protection algorithms
Road network
Time complexity
Voronoi diagrams
A method of constructing arc edge anonymous area based on LBS privacy protection in the internet of vehicles
期刊论文
International Journal of Network Security, 2020, 卷号: 22, 期号: 2, 页码: 275-282
作者:
Xie,Peng-Shou
;
Han,Xue-Ming
;
Feng,Tao
;
Yan,Yan
;
Ma,Guo-Qiang
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/13
Anonymity
Anonymous Regions Constructed
Arc Edge Anonymous Area
Internet of Vehicles
Location Privacy
A survey on location privacy protection in Wireless Sensor Networks
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 卷号: 125, 页码: 93-114
作者:
Jiang, Jinfang
;
Han, Guangjie
;
Wang, Hao
;
Guizani, Mohsen
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/02
Wireless Sensor Networks
Location privacy preserving
Location anonymity
Phantom routing
A survey on privacy protection in blockchain system
期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 卷号: 126
作者:
Feng, Qi
;
He, Debiao
;
Zeadally, Sherali
;
Khan, Muhammad Khurram
;
Kumar, Neeraj
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/05
Privacy
Anonymity
Blockchain
Cryptography
Cryptocurrency
BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 期号: 2
作者:
Wang, Huaqun
;
Wang, Qihua
;
He, Debiao
;
Li, Qi
;
Liu, Zhe
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2019/12/05
Anonymity
blockchain
reward
smart grid
vehicle-to-grid (V2G) networks
Secure Key Agreement and Key Protection for Mobile Device User Authentication
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 期号: 2
作者:
Wu, Libing
;
Wang, Jing
;
Choo, Kim-Kwang Raymond
;
He, Debiao
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/12/05
Authentication
two-party
mobile
anonymity
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices
期刊论文
IEEE SYSTEMS JOURNAL, 2019, 卷号: 13, 期号: 3
作者:
Feng, Qi
;
He, Debiao
;
Zeadally, Sherali
;
Kumar, Neeraj
;
Liang, Kaitai
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/05
Anonymity
authentication
ideal lattice
mobile device
provably security
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession
期刊论文
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 卷号: 12, 期号: 5
作者:
Wang, Huaqun
;
He, Debiao
;
Yu, Jia
;
Wang, Zhiwei
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/05
Protocols
Cloud computing
Concrete
Privacy
Public key cryptography
Servers
Cloud computing
provable data possession
identity-based cryptography
incentive
anonymity
©版权所有 ©2017 CSpace - Powered by
CSpace