消息
×
loading..
中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [6]
长春光学精密机械与物... [3]
科技战略咨询研究院 [1]
新疆理化技术研究所 [1]
心理研究所 [1]
中国科学院大学 [1]
更多
采集方式
OAI收割 [14]
iSwitch采集 [2]
_filter
_filter
_filter
筛选
浏览/检索结果:
共16条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A metrics-based meta-learning model with meta-pretraining for industrial knowledge graph construction
期刊论文
OAI收割
COMPUTERS IN INDUSTRY, 2022, 卷号: 143
作者:
Liu, Yangshengyan
|
收藏
|
浏览/下载:20/0
|
提交时间:2023/05/30
Industrial knowledge graph
Few-shot text classification
Meta-learning
Deep metric learning
Attribute-based fusion
Research on attribute-based encryption access control technology in edge computing environment
会议论文
OAI收割
Beijing, China, October 22-24, 2021
作者:
Jiang YH(蒋一恒)
;
Zhang Chen
;
Zhang BW(张博文)(2.3)
;
Yuan DC(袁德成)
;
Wang C(王晨)
|
收藏
|
浏览/下载:28/0
|
提交时间:2022/04/23
access control
attribute-based encryption
edge computing
edge nodes
information security
An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing
期刊论文
OAI收割
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 卷号: 15, 期号: 12, 页码: 6500-6509
作者:
Li, JQ (Li, Jianqiang)[ 1 ]
;
Wang, SL (Wang, Shulan)[ 2 ]
;
Li, Y (Li, Yuan)[ 1 ]
;
Wang, HY (Wang, Haiyan)[ 1 ]
;
Wang, HW (Wang, Huiwen)[ 1 ]
|
收藏
|
浏览/下载:52/0
|
提交时间:2020/01/10
Encryption
Cloud computing
Outsourcing
Informatics
Computational efficiency
Attribute-based encryption (ABE)
ciphertext policy (CP)
Cloud computing
file update
policy update
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
期刊论文
iSwitch采集
Security and communication networks, 2016, 卷号: 9, 期号: 12, 页码: 1748-1758
作者:
Lin, Suqing
;
Zhang, Rui
;
Wang, Mingsheng
收藏
|
浏览/下载:33/0
|
提交时间:2019/05/09
Attribute-based proxy re-encryption
Verifiability
Master key security
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme
期刊论文
OAI收割
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 卷号: 28, 期号: 4, 页码: 1237-1245
Wang, MQ
;
Zhang, ZF
;
Chen, C
|
收藏
|
浏览/下载:39/0
|
提交时间:2016/12/09
privacy-preserving
decentralized attribute-based encryption
security analysis
A lightweight attribute-based encryption scheme for the internet of things
期刊论文
iSwitch采集
Future generation computer systems-the international journal of grid computing and escience, 2015, 卷号: 49, 页码: 104-112
作者:
Yao, Xuanxia
;
Chen, Zhi
;
Tian, Ye
收藏
|
浏览/下载:49/0
|
提交时间:2019/05/09
Internet of things
Attribute-based encryption
Elliptic curve cryptography
Decision diffie-hellman problem
Selective-set model
支持用户撤销的属性认证密钥协商协议
期刊论文
OAI收割
通信学报, 2014, 卷号: 35, 期号: 5, 页码: 33-43
李强
;
冯登国
;
张立武
|
收藏
|
浏览/下载:27/0
|
提交时间:2014/12/16
认证
密钥协商
基于属性
密钥撤销
标准模型
authentication
key agreement
attribute-based
key revocation
standard model
面向社交网络的隐私保护方案
期刊论文
OAI收割
通信学报, 2014, 卷号: 35, 期号: 8, 页码: 23-32
吕志泉
;
洪澄
;
张敏
;
冯登国
;
陈开渠
|
收藏
|
浏览/下载:31/0
|
提交时间:2014/12/16
社交网络
隐私保护
属性加密
令牌树
属性撤销
social network
privacy-preserving
attribute-based encryption
token tree
attribute revocation
Security analysis of a privacy-preserving decentralized key-policy attribute-based encryption scheme
期刊论文
OAI收割
IEEE Transactions on Parallel and Distributed Systems, 2013, 卷号: 24, 期号: 11, 页码: 2319-2321
Ge, Aijun (1)
;
Zhang, Jiang (2)
;
Zhang, Rui (3)
;
Ma, Chuangui (1)
;
Zhang, Zhenfeng (2)
|
收藏
|
浏览/下载:21/0
|
提交时间:2014/12/16
Cryptanalysis
attribute-based encryption
privacy
access control
From quality to quantity: The role of common features in consumer preference
期刊论文
OAI收割
JOURNAL OF ECONOMIC PSYCHOLOGY, 2012, 卷号: 33, 期号: 6, 页码: 1043-1058
作者:
Su, Yin
;
Rao, Li-Lin
;
Li, Xingshan
;
Wang, Yong
;
Li, Shu
收藏
|
浏览/下载:44/0
|
提交时间:2015/08/24
Common features
Cancellation-and-focus model
Equate-to-differentiate approach
Eye-tracking
Attribute-based strategies
首页
上一页
1
2
下一页
末页