×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [23]
软件研究所 [15]
山东大学 [10]
北京航空航天大学 [8]
北京大学 [7]
中国科学院大学 [6]
更多...
内容类型
期刊论文 [73]
会议论文 [11]
其他 [2]
学位论文 [2]
发表日期
2019 [5]
2018 [4]
2017 [14]
2016 [4]
2015 [4]
2014 [3]
更多...
学科主题
Computer S... [6]
Informatio... [3]
主题分类subjec... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共88条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An Efficient and Secure Authentication Scheme for Vehicle Sensor Networks
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 2
作者:
Zhang, Jiani
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Vehicle Sensor Networks
Vehicle-to-vehicle
Provable security
ECC-based authentication
Identity-Based Broadcast Encryption with Efficient Revocation
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 卷号: 11442 LNCS, 页码: 405-435
作者:
Ge, Aijun
;
Wei, Puwen
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/11
Asymmetric pairings
Broadcast encryption
Constant size ciphertext
Provable security
Revocation
Implementation and security analysis of practical quantum secure direct communication
期刊论文
LIGHT-SCIENCE & APPLICATIONS, 2019, 卷号: 8, 页码: 22
作者:
Qi, Ruoyang
;
Sun, Zhen
;
Lin, Zaisheng
;
Niu, Penghao
;
Hao, Wentao
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Forward error correction
Quantum computers
Quantum cryptography
Quantum theory
Secure communication
Supercomputers
Experimental demonstrations
Low-density parity-check (LDPC) codes
Proof of principles
Provable security
Quantum secure direct communication
Realistic environments
Secret information
Security analysis
Quantum communication
HIBGE: Monitorable and Traceable Anonymous Encryption in Cloud Computing
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 页码: 637-650
作者:
Li, Dawei
;
Liu, Jianwei
;
Wu, Qianhong
;
Guan, Zhenyu
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/12/30
Hierarchical Identity-Based Group Encryption
Cloud computing
Anonymity
Traceability
Provable security
Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper)
会议论文
London, United kingdom, August 19, 2019 - August 22, 2019
作者:
Feng, Tao
;
Jiao, Ying
;
Fang, Junli
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/11/15
Blockchain
Digital storage
Network security
Distributed environments
Medical cloud (MC)
Medical institutions
Privacy preserving
Provable security
Proxy re encryptions
Random Oracle model
Security analysis
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
期刊论文
IEEE SYSTEMS JOURNAL, 2018, 卷号: 12, 期号: 2
作者:
He, Debiao
;
Kumar, Neeraj
;
Khan, Muhammad Khurram
;
Wang, Lina
;
Shen, Jian
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/05
Anonymity
authentication scheme
mobile cloud computing (MCC)
privacy
provable security
New Efficient Certificateless Aggregate Signature Scheme
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2018, 卷号: 19, 期号: 7
作者:
Xu, Zhiyan
;
Wu, Libing
;
Ren, Yongjun
;
He, Debiao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Cryptanalysis
Signature forgery attack
Provable security
Certificateless aggregate signature
A New Post-Quantum Blind Signature From Lattice Assumptions
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 27251-27258
作者:
Zhang, Pingyuan
;
Jiang, Han
;
Zheng, Zhihua
;
Hu, Peichu
;
Xu, Qiuliang
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2019/12/11
Post-quantum cryptography
blind signatures
lattices
provable
security
digital cash system
Efficient subtree-based encryption for fuzzy-entity data sharing
期刊论文
SOFT COMPUTING, 2018, 卷号: 22, 页码: 7961-7976
作者:
Liu, Weiran
;
Liu, Jianwei
;
Wu, Qianhong
;
Qin, Bo
;
Naccache, David
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Subtree-based broadcast encryption
Fuzzy-entity data sharing
Provable security
An integrity verification scheme of completeness and zero-knowledge for multi-Cloud storage
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 卷号: 30, 期号: 16
作者:
Cao, Laicheng
;
He, Wenwen
;
Liu, Yufei
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/15
cloud storage security
dynamic operations
integrity verification
provable data possession
zero-knowledge
©版权所有 ©2017 CSpace - Powered by
CSpace