×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安理工大学 [9]
内容类型
会议论文 [6]
期刊论文 [3]
发表日期
2018 [2]
2014 [1]
2013 [2]
2012 [2]
2011 [1]
2008 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
限定条件
专题:西安理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Code Authority Control Method Based on File Security Level and ACL in WebIDE
会议论文
2018 IEEE INTERNATIONAL CONFERENCE OF INTELLIGENT ROBOTICS AND CONTROL ENGINEERING (IRCE), 2018-01-01
作者:
Li, Junhuai
;
Ji, Wenchao
;
Tian, Jubo
;
Wang, Huaijun
;
Wang, Kan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/20
WebIDE
access control list
software security
permission control
Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control
期刊论文
2018, 卷号: 12, 页码: 141-149
作者:
Wang, Shangping
;
Zhang, Xia
;
Zhang, Yaling
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/20
cryptography
authorisation
learning (artificial intelligence)
trees (mathematics)
lattice theory
revocable-and-grantable attribute-based encryption
RABE scheme
fine-grained access control
identity-based encryption
data security
binary tree technique
attribute revocation
attribute granting
learning-with-errors assumption
A feasible control strategy for LQG control problem with parameter and structure uncertainties
会议论文
10th International Conference on Computational Intelligence and Security CIS 2014, Kunming U Sci Technol, Kunming, PEOPLES R CHINA, 2014-11-15
作者:
Xie, Guo
;
Zhang, Dan
;
Hei, Xinhong
;
Qian, Fucai
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/20
LQG
receding horizon
parameter uncertainties
structure uncertainty
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
期刊论文
2013, 卷号: 21, 页码: 621-633
作者:
Wu, Qianhong
;
Qin, Bo
;
Zhang, Lei
;
Domingo-Ferrer, Josep
;
Manjón, Jesús A.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/20
Access control
ad hoc networks
broadcast
cooperative computing
information security
key management
Policy Analysis for Administrative Role Based Access Control without Separate Administration
会议论文
DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013-01-01
作者:
Yang, Ping
;
Gofman, Mikhail
;
Yang, Zijiang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/20
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
期刊论文
2012, 卷号: 210, 页码: 67-80
作者:
Qin, Bo
;
Wu, Qianhong
;
Zhang, Lei
;
Farràs, Oriol
;
Domingo-Ferrer, Josep
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/20
Public-key cryptosystem
Threshold public-key encryption
Adaptive security
Access control
A new network security model based on machine learning
会议论文
2012 International Conference on Control Engineering and Communication Technology, ICCECT 2012, Shenyang, Liaoning, China, 2012-12-07
作者:
Wang, Hai-Sheng
;
Gui, Xiao-Lin
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/20
Fully Distributed Broadcast Encryption
会议论文
PROVABLE SECURITY, 2011-01-01
作者:
Wu, Qianhong
;
Qin, Bo
;
Zhang, Lei
;
Domingo-Ferrer, Josep
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2019/12/20
Broadcast encryption
Bilinear pairing
Provable security
Secrets escrow
Access control
A Novel Generalized Framework for Access Control Based on the Immune Mechanism
会议论文
7th World Congress on Intelligent Control and Automation, Chongqing, PEOPLES R CHINA, 2008-06-25
作者:
Wang, Lei
;
Yin, Caiyan
;
Dong, Han
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/25
Access control
information security
artificial immune system
self-adaptive
©版权所有 ©2017 CSpace - Powered by
CSpace