×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [163]
大连理工大学 [141]
湖南大学 [113]
武汉大学 [89]
北京航空航天大学 [84]
西安交通大学 [57]
更多...
内容类型
期刊论文 [882]
会议论文 [245]
学位论文 [41]
其他 [36]
会议 [9]
发表日期
2022 [8]
2021 [9]
2020 [10]
2019 [117]
2018 [137]
2017 [115]
更多...
学科主题
Computer S... [3]
Computer S... [2]
Informatio... [2]
computer s... [2]
computer s... [1]
energy & f... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共1213条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:
Yongxia Shi
;
Ehsan Nekouei
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/03/18
Cyber-security
encrypted control
event-triggered control (ETC)
networked control systems (NCSs)
semi-homomorphic encryption
Blockchain-Based Crypto Management for Reliable Real-Time Decision-Making
期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 卷号: 10, 期号: 6, 页码: 3333-3342
作者:
Wang, Ge
;
Li, Juanjuan
;
Wang, Xiao
;
Li, Junqing
;
Yuan, Yong
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/07/03
Blockchains
Decision making
Reliability
Security
Encryption
Smart contracts
Data models
Blockchain
crypto management
decentralized autonomous organizations (DAOs)
federated data
non-fungible token (NFT)
smart contract
Color image encryption algorithm based on hyperchaotic system and improved quantum revolving gate
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 10, 页码: 13845-13865
作者:
Wang, Xingyuan
;
Su, Yining
;
Luo, Chao
;
Nian, Fuzhong
;
Teng, Lin
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2022/06/20
Color
Cryptography
Image enhancement
Quantum computers
Color image encryptions
Encryption system
Four-wing chaotic system
Hyper-chaotic systems
Image encryption algorithm
Novelty enhanced quantum representation
Quantum color image encryption
Quantum Computing
Quantum images
Quantum rotation
A new discrete chaotic map application in image encryption algorithm
期刊论文
PHYSICA SCRIPTA, 2022, 卷号: 97, 期号: 3
作者:
Yang, Feifei
;
An, Xinlei
;
Xiong, Li
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/03/01
discrete chaotic map
encryption algorithm
security evaluation
A memristive system and its applications in red-blue 3D glasses and image encryption algorithm with DNA variation
期刊论文
NONLINEAR DYNAMICS, 2022, 卷号: 107, 期号: 3, 页码: 2911-2933
作者:
Xiong, Li
;
Yang, Feifei
;
Mou, Jun
;
An, Xinlei
;
Zhang, Xinguo
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/03/01
Memristive system
Red-blue 3D glasses
Image encryption algorithm
DNA variation
Hardware implementation
A novel hyperchaotic image encryption algorithm with simultaneous shuffling and diffusion
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 卷号: 81, 期号: 15, 页码: 21975-21994
作者:
Gui, Xiangquan
;
Huang, Jun
;
Li, Li
;
Li, Shouliang
;
Cao, Jie
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/04/21
Hyperchaotic map
Image encryption
Simultaneous shuffling and diffusion
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
Privacy-Preserving Publicly Verifiable Databases
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 3, 页码: 1639-1654
作者:
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/05/29
Cloud computing
Encryption
Protocols
Indexes
Verifiable databases
privacy-preserving
publicly verifiable
cloud computing
©版权所有 ©2017 CSpace - Powered by
CSpace