×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [8]
江苏大学 [2]
北京航空航天大学 [1]
山东大学 [1]
安徽大学 [1]
武汉大学 [1]
更多...
内容类型
期刊论文 [10]
会议论文 [4]
发表日期
2019 [3]
2018 [5]
2016 [2]
2014 [1]
2012 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共14条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Efficient Authentication of Multi-Dimensional Top-$k$Queries
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 4748-4762
作者:
Xiaoyu Zhu
;
Jie Wu
;
Wei Chang
;
Guojun Wang
;
Qin Liu
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/13
Authentication
Servers
Cloud
computing
Databases
Diabetes
Computational
modeling
Data
outsourcing
multi-dimension
query
authentication
signature
chain
top-kquery
Efficient Authentication of Multi-Dimentional Top-k Queries
期刊论文
IEEE ACCESS, 2019, 卷号: Vol.7, 页码: 4748-4762
作者:
Zhu, XY
;
Wu, J
;
Chang, W
;
Wang, GJ
;
Liu, Q
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/17
Data outsourcing
multi-dimension
query authentication
signature chain
top-k query
Privacy-preserving k nearest neighbor query with authentication on road networks
期刊论文
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 卷号: 134, 页码: 25-36
作者:
Yang, Shumei
;
Tang, Shaohua
;
Zhang, Xiao
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Cloud computing
Privacy
Authentication
kNN query
Graph encryption
Secure Top-k Preference Query for Location-based Services in Crowd-outsourcing Environments
期刊论文
COMPUTER JOURNAL, 2018, 卷号: 61, 期号: 4, 页码: 496-511
作者:
Wu, Haiqin[1]
;
Wang, Liangmin[2]
;
Jiang, Shunrong[3]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/24
crowd-outsourcing
top-k preference query
location-based service
dominant authentication graph
integrity
A Dual Privacy Preserving Scheme in Continuous Location-Based Services
期刊论文
IEEE Internet of Things Journal, 2018, 卷号: Vol.5 No.5, 页码: 4191-4200
作者:
Shaobo Zhang
;
Guojun Wang
;
Zakirul Alam Bhuiyan
;
Qin Liu
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/26
Privacy
Trajectory
Servers
Computer architecture
Internet of Things
Collaboration
Computer science
K-anonymity
multiple anonymizers
query authentication
Shamir threshold
trajectory and content privacy
A Dual Privacy Preserving Scheme in Continuous Location-Based Services
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2018, 卷号: Vol.5 No.5, 页码: 4191-4200
作者:
Zhang, SB
;
Wang, GJ
;
Bhuiyan, MZA
;
Liu, Q
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/26
K-anonymity
multiple anonymizers
query authentication
Shamir threshold
trajectory and content privacy
A Dual Privacy Preserving Scheme in Continuous Location-Based Services
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2018, 卷号: Vol.5 No.5, 页码: 4191-4200
作者:
Zhang, Shaobo
;
Wang, Guojun
;
Bhuiyan, Md Zakirul Alam
;
Liu, Qin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/26
K-anonymity
multiple anonymizers
query authentication
Shamir threshold
trajectory and content privacy
A Dual Privacy Preserving Scheme in Continuous Location-Based Services
期刊论文
IEEE Internet of Things Journal, 2018, 页码: 1
作者:
Shaobo Zhang
;
Guojun Wang
;
Md Zakirul Alam Bhuiyan
;
Qin Liu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/26
Privacy
Trajectory
Servers
Computer
architecture
Internet
of
Things
Collaboration
Computer
science
Trajectory
and
Content
Privacy
Multiple
Anonymizers
Shamir
Threshold
K-anonymity
Query
Authentication.
Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data
期刊论文
2016 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD 2016), 2016, 页码: 200-206
作者:
Zhong, Hong
;
Wang, Liangmin
;
Xie, Qingqing
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/24
cloud data
query authentication
anonymous data
non-repudiation protocol
privacy preservation
Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data
会议论文
4th International Conference on Advanced Cloud and Big Data (CBD), 2016-01-01
作者:
Xie, Qingqing[1]
;
Wang, Liangmin[2]
;
Zhong, Hong[3]
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/24
cloud data
query authentication
anonymous data
non-repudiation protocol
privacy preservation
©版权所有 ©2017 CSpace - Powered by
CSpace