欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
Trustworthy Service Composition in Service-oriented Mobile Social Networks
所属机构名称:西安电子科技大学
会议名称:International Conference of Web Services (ICWS2004)
时间:2014.6.27
成果类型:会议
相关项目:数字社区无线网络信息融合安全理论及关键技术研究
同会议论文项目
数字社区无线网络信息融合安全理论及关键技术研究
期刊论文 137
会议论文 35
获奖 8
著作 1
同项目会议论文
CRVad: Confidential Reasoning and Verification towards Secure Routing in Ad Hoc Networks
A Stochastic Geometry Analysis of D2D Overlaying Multi-Channel Downlink Cellular Networks
PRAM : privacy preserving access management scheme in cloud services
Ciphertext - Policy Weighted Attribute Based Encryption for Fine - Grained Access Control
Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Comput
Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Co
Content Based Spam Text Classification: An Empirical Comparison between English and Chinese
PRAM: Privacy preserving access management scheme in cloud services
Device-to-Device Communication Overlaying Two-Hop Multi-Channel Uplink Cellular Networks
A Trusted Authentication Scheme for Wireless Networks using Direct Anonymous Attestation
Efficient Data Integrity Verification Using Attribute Based Multi-Signature Scheme in Wireless Netwo
A Demand-Aware Location Privacy Protection Scheme in Continuous Location-based Services
An Efficient WLAN Initial Access Authentication Protocol
Efficient data integrity verification using attribute based multi - signature scheme in wireless net
A secure document self-destruction scheme: An ABE approach
A Secure Document Self - Destruction Scheme with Identity Based Encryption
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security
Verifying Location-based Services with Declassification Enforcement
GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks
Data Owner Based Attribute Based Encryption
GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing
Service Composition in Multi-domain Environment under Time Constraint
A secure document self-destruction scheme with identity based encryption
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control
Data gathering and processing for large-scale wireless sensor networks
Continuous Context-Aware Device Comfort Evaluation Method
New Compact CCA Secure Elgamal Scheme in the Random Oracle Model
AnApproximate Optimal Coverage Set Algorithm in Wireless Sensor Networks
Verifying Secure Interface Composition for Component-based System Designs
Multi-domain Direct Anonymous Attestation Scheme from Pairings
Game Optimization for Time - Critical Multicast Data Origin Authentication : Trade Off between Secur
Fully Secure Decentralized Key - Policy Attribute - Based Encryption