CORC

浏览/检索结果: 共26条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Public-Key Encryption With Keyword Search via Obfuscation 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 37394-37405
作者:  Hu, Chengyu;  Liu, Pengtao;  Yang, Rupeng;  Xu, Yan
收藏  |  浏览/下载:13/0  |  提交时间:2019/12/11
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience 期刊论文
JOURNAL OF SUPERCOMPUTING, 2019, 卷号: 75, 期号: 6, 页码: 3099-3122
作者:  Hu, Chengyu;  Yang, Rupeng;  Liu, Pengtao;  Li, Tong;  Kong, Fanyu
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/11
Distributed Krein space-based attack detection over sensor networks under deception attacks 期刊论文
AUTOMATICA, 2019, 卷号: 109
作者:  Ge, Xiaohua;  Han, Qing-Long;  Zhong, Maiying;  Zhang, Xian-Ming
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
A provably secure certificateless public key encryption with keyword search 期刊论文
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 卷号: 42, 期号: 1, 页码: 20-28
作者:  Wu, Tsu-Yang;  Chen, Chien-Ming;  Wang, King-Hang;  Meng, Chao;  Wang, Eric Ke
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/11
Robust Image Watermarking Algorithm Based on ASIFT against Geometric Attacks 期刊论文
APPLIED SCIENCES-BASEL, 2018, 卷号: 8, 期号: 3
作者:  Wang, Chengyou;  Zhang, Yunpeng;  Zhou, Xiao
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/11
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience 期刊论文
Journal of Supercomputing, 2018
作者:  Hu C.;  Yang R.;  Liu P.;  Li T.;  Kong F.
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/11
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks 期刊论文
Mobile Networks and Applications, 2018
作者:  Hu C.;  Li Z.;  Liu P.;  Yang R.;  Guo S.
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques 期刊论文
Science China(Information Sciences), 2018, 期号: 09, 页码: 282-284
作者:  Ning WANG;  Xiaoyun WANG;  Keting JIA;  Jingyuan ZHAO
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/11
ETMRM: An Energy-efficient Trust Management and Routing Mechanism for SDWSNs 期刊论文
COMPUTER NETWORKS, 2018, 卷号: 139, 页码: 119-135
作者:  Wang, Rui;  Zhang, Zhiyong
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/11
BWManager: Mitigating Denial of Service Attacks in Software-Defined Networks Through Bandwidth Prediction 期刊论文
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2018, 卷号: 15, 期号: 4, 页码: 1235-1248
作者:  Wang, Tao;  Guo, Zehua;  Chen, Hongchang;  Liu, Wei
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/11


©版权所有 ©2017 CSpace - Powered by CSpace