×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [26]
内容类型
期刊论文 [21]
会议论文 [5]
发表日期
2019 [4]
2018 [7]
2017 [3]
2016 [3]
2015 [1]
2011 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共26条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Public-Key Encryption With Keyword Search via Obfuscation
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 37394-37405
作者:
Hu, Chengyu
;
Liu, Pengtao
;
Yang, Rupeng
;
Xu, Yan
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/11
Public-key encryption with keyword search
obfuscation
keyword guessing
attacks
multiple functionalities
multi-user setting
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
期刊论文
JOURNAL OF SUPERCOMPUTING, 2019, 卷号: 75, 期号: 6, 页码: 3099-3122
作者:
Hu, Chengyu
;
Yang, Rupeng
;
Liu, Pengtao
;
Li, Tong
;
Kong, Fanyu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/11
Public-key encryption
Side-channel attacks
Tampering resilience
Leakage resilience
Continuous attacks
Distributed Krein space-based attack detection over sensor networks under deception attacks
期刊论文
AUTOMATICA, 2019, 卷号: 109
作者:
Ge, Xiaohua
;
Han, Qing-Long
;
Zhong, Maiying
;
Zhang, Xian-Ming
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Distributed attack detection
Sensor networks
Deception attacks
Distributed resilient estimation
Krein space
A provably secure certificateless public key encryption with keyword search
期刊论文
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 卷号: 42, 期号: 1, 页码: 20-28
作者:
Wu, Tsu-Yang
;
Chen, Chien-Ming
;
Wang, King-Hang
;
Meng, Chao
;
Wang, Eric Ke
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/11
PEKS
certificateless
off-line keyword guessing attacks
provably
secure
Robust Image Watermarking Algorithm Based on ASIFT against Geometric Attacks
期刊论文
APPLIED SCIENCES-BASEL, 2018, 卷号: 8, 期号: 3
作者:
Wang, Chengyou
;
Zhang, Yunpeng
;
Zhou, Xiao
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/11
digital image watermarking
copyright protection
discrete wavelet
transform (DWT)
affine-scale-invariance feature transform (ASIFT)
geometric attacks
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
期刊论文
Journal of Supercomputing, 2018
作者:
Hu C.
;
Yang R.
;
Liu P.
;
Li T.
;
Kong F.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/11
Continuous attacks
Leakage resilience
Public-key encryption
Side-channel attacks
Tampering resilience
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
期刊论文
Mobile Networks and Applications, 2018
作者:
Hu C.
;
Li Z.
;
Liu P.
;
Yang R.
;
Guo S.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Continual memory attacks
Keyword guessing attacks
Leakage resilience
PEKS
Verifiable
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques
期刊论文
Science China(Information Sciences), 2018, 期号: 09, 页码: 282-284
作者:
Ning WANG
;
Xiaoyun WANG
;
Keting JIA
;
Jingyuan ZHAO
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/11
MON
SI
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques
ETMRM: An Energy-efficient Trust Management and Routing Mechanism for SDWSNs
期刊论文
COMPUTER NETWORKS, 2018, 卷号: 139, 页码: 119-135
作者:
Wang, Rui
;
Zhang, Zhiyong
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/11
SDWSNs
Malicious forwarding attacks
Trust management
Trust routing
Energy efficiency
BWManager: Mitigating Denial of Service Attacks in Software-Defined Networks Through Bandwidth Prediction
期刊论文
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2018, 卷号: 15, 期号: 4, 页码: 1235-1248
作者:
Wang, Tao
;
Guo, Zehua
;
Chen, Hongchang
;
Liu, Wei
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/11
SDN
OpenFlow
DoS attacks
time slice allocation
priority queue
controller scheduling method
©版权所有 ©2017 CSpace - Powered by
CSpace