欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
期刊
> 期刊详情页
<span style="font-size:10.5pt;font-family:"color:black;">Hierarchical quant
期刊名称:Quantum Information Processing, DOI 10.1007/s11128
时间:0
页码:-
相关项目:下一代互联网安全与隐私关键性技术的研究
作者:
Gang Xu|Cong Wang|Yi-Xian Yang|
同期刊论文项目
下一代互联网安全与隐私关键性技术的研究
期刊论文 184
会议论文 113
同项目期刊论文
TST: Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud Computing
安全两方线段求交协议及其在保护隐私凸包交集中的应用
基于动态邻接信任模型的安全路由算法研究
基于参数建模的分布式信任模型
面向MANET路由的多属性动态信任模型
利用干扰消除的协同中继传输方案
基于代理的即时属性撤销KP-ABE方案
TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network
<span style="font-family: ;" lang="EN-US" New="" Times=""
CPPA:Cloud based Privacy Preserving Aggregation Architecture in Muti-Domain Wireless Networks
Quantum secret sharing for general access structures based on multiparticle entanglements
A class of protocols for quantum private comparison based on the symmetry of states
Efficient Lattice - Based Signcryption in Standard Model
Effect of spatial distribution on the synchronization in rings of coupled oscillators
An Efficient Patch Dissemination Strategy for Mobile Networks
Adaptive Synchronization of Complex Dynamical Multilinks Networks with Similar Nodes
MobSafe:Cloud Computing Based Forensic Analysis for Massive Mobile Applications Using Data Mining
<span style="font-size:10.5pt;font-family:"color:black;">Quantum secret sha
Dependability Analysis of Control Center Networks in Smart Grid
A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomo
Hierarchical quantum information splitting of an arbitrary two - qubit state via the cluster state
一种无状态的短签名方案
A secure and efficient data aggregation framework in vehicular sensing networks
More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles
A collaborative botnets suppression system based on overlay network
<span style="font-size:10.5pt;font-family:"color:black;">A class of protoco
Human-factor-aware Privacy Preserving Aggregation in Smart Grid
Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
Performance evaluation and dynamic optimization of speed scaling on web servers in cloud computing
Securing m-healthcare social networks: challenges, countermeasures and future directions
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encrypt
<span style="font-size:10.5pt;font-family:"">CCA-Secure IB-KEM from Identit
SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs
Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups
<span style="font: 13px/16px Arial, sans-serif; color: rgb(34, 34, 34); text-transform: none
一个高效安全的空间加密方案
<span style="font-size:10.5pt;font-family:""><a href="http://online
<span style="color: black; font-family: ;" Roman?,?serif?;font-size:10.5pt;?="&quo
Efficient Trust Based Information Sharing over Distributed Collaborative Network
基于CNN同心邻域极值的多车道智能交通系统图像多车牌区域的边缘检测
动态疫苗接种的入侵检测方法
基于可信建模过程的信任模型评估算法
对一个格基身份签名方案的分析和改进
基于粗糙集和人工免疫的集成入侵检测模型
一种基于身份的智能电网认证模式
VANET中一种保护隐私的安全叫车协议
微博影响力评价研究
TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security
有限域上方程x~r=a的求解
基于覆盖网的协同式网络安全防护与分析系统
ICN体系结构与技术研究
物联网汇聚安全网关关键技术研究
高速网络流量管理系统研究
内容中心网络的隐私问题研究
基于特征码病毒扫描技术的研究
基于倒排列表的网流索引检索与压缩方法
一种基于大数据技术的舆情监控系统
Google Bigtable系统的可信性研究