×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [11]
北京航空航天大学 [11]
武汉大学 [8]
山东大学 [7]
清华大学 [5]
兰州理工大学 [5]
更多...
内容类型
期刊论文 [54]
会议论文 [20]
会议 [2]
其他 [2]
发表日期
2022 [2]
2021 [2]
2019 [5]
2018 [12]
2017 [7]
2016 [8]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共78条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption
期刊论文
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 卷号: 66, 期号: 1, 页码: 871-884
作者:
Feng, Tao
;
Pei, Hongmei
;
Ma, Rong
;
Tian, Youliang
;
Feng, Xiaoqin
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/03/12
Blockchain
privacy protection
attribute encryption
access control
searchable-encryption
Research on attribute-based encryption access control technology in edge computing environment
会议论文
Beijing, China, October 22-24, 2021
作者:
Jiang YH(蒋一恒)
;
Zhang Chen
;
Zhang BW(张博文)(2.3)
;
Yuan DC(袁德成)
;
Wang C(王晨)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/04/23
access control
attribute-based encryption
edge computing
edge nodes
information security
ACS-HCA: An Access Control Scheme Under Hierarchical Cryptography Architecture
期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2019, 卷号: 28, 期号: 1
作者:
Shi Jiaoli
;
Huang Chuanhe
;
He Kai
;
Shen Xieyang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/05
Cloud storage
Access control
Ciphertext-policy attribute-based encryption
Hierarchical cryptography architecture
Attribute revocation
CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 5682-5694
作者:
Hui Yin
;
Jixin Zhang
;
Yinqiao Xiong
;
Lu Ou
;
Fangmin Li
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/13
Encryption
Access
control
Servers
Logic
gates
Keyword
search
Access
control
attribute-based
encryption
search
authorization
searchable
encryption
CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme
期刊论文
IEEE ACCESS, 2019, 卷号: Vol.7, 页码: 5682-5694
作者:
Yin, H
;
Zhang, JX
;
Xiong, YQ
;
Ou, L
;
Li, FM
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/17
Access control
attribute-based encryption
search authorization
searchable encryption
Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications
期刊论文
2019, 卷号: 7, 页码: 137594-137607
作者:
Zhang, Qian
;
Wang, Shangping
;
Zhang, Duo
;
Wang, Jifang
;
Zhang, Yaling
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/20
Attribute based encryption
dual access control
time specified encryption
data integrity verification
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 11688-11697
作者:
Li, Dawei
;
Liu, Jianwei
;
Wu, Qianhong
;
Guan, Zhenyu
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/30
Fog computing
attribute-based encryption
distributed access control
multi-authority
large-universe
Contexts-States-Aware Access Control for Internet of Things
会议论文
作者:
Dong, Yuji
;
Wan, Kaiyu
;
Huang, Xin
;
Yue, Yong
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/11/19
Access control policies
Attribute based access control
Extensible access control markup languages
Internet of Things (IOT)
Reference architecture
Role-based Access Control
Semantic Web rule language (SWRL)
Semantic Web technology
©版权所有 ©2017 CSpace - Powered by
CSpace