欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
立项数据库
> 立项详情页
下一代互联网安全与隐私关键性技术的研究
项目名称:下一代互联网安全与隐私关键性技术的研究
项目类别:国际(地区)合作与交流项目
批准号:61161140320
项目来源:国家自然科学基金
研究期限:1900-01-01-1900-01-01
项目负责人:曹珍富
依托单位:上海交通大学
批准年度:2011
成果综合统计
成果类型
数量
期刊论文
会议论文
专利
获奖
著作
184
113
0
0
0
期刊论文
TST: Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud Computing
安全两方线段求交协议及其在保护隐私凸包交集中的应用
基于动态邻接信任模型的安全路由算法研究
基于参数建模的分布式信任模型
面向MANET路由的多属性动态信任模型
利用干扰消除的协同中继传输方案
基于代理的即时属性撤销KP-ABE方案
TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network
<span style="font-family: ;" lang="EN-US" New="" Times=""
<span style="font-size:10.5pt;font-family:"color:black;">Hierarchical quant
CPPA:Cloud based Privacy Preserving Aggregation Architecture in Muti-Domain Wireless Networks
Quantum secret sharing for general access structures based on multiparticle entanglements
A class of protocols for quantum private comparison based on the symmetry of states
Efficient Lattice - Based Signcryption in Standard Model
Effect of spatial distribution on the synchronization in rings of coupled oscillators
An Efficient Patch Dissemination Strategy for Mobile Networks
Adaptive Synchronization of Complex Dynamical Multilinks Networks with Similar Nodes
MobSafe:Cloud Computing Based Forensic Analysis for Massive Mobile Applications Using Data Mining
<span style="font-size:10.5pt;font-family:"color:black;">Quantum secret sha
Dependability Analysis of Control Center Networks in Smart Grid
A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomo
Hierarchical quantum information splitting of an arbitrary two - qubit state via the cluster state
一种无状态的短签名方案
A secure and efficient data aggregation framework in vehicular sensing networks
More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles
A collaborative botnets suppression system based on overlay network
<span style="font-size:10.5pt;font-family:"color:black;">A class of protoco
Human-factor-aware Privacy Preserving Aggregation in Smart Grid
Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
Performance evaluation and dynamic optimization of speed scaling on web servers in cloud computing
Securing m-healthcare social networks: challenges, countermeasures and future directions
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encrypt
<span style="font-size:10.5pt;font-family:"">CCA-Secure IB-KEM from Identit
SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs
Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups
<span style="font: 13px/16px Arial, sans-serif; color: rgb(34, 34, 34); text-transform: none
一个高效安全的空间加密方案
<span style="font-size:10.5pt;font-family:""><a href="http://online
<span style="color: black; font-family: ;" Roman?,?serif?;font-size:10.5pt;?="&quo
Efficient Trust Based Information Sharing over Distributed Collaborative Network
基于CNN同心邻域极值的多车道智能交通系统图像多车牌区域的边缘检测
动态疫苗接种的入侵检测方法
基于可信建模过程的信任模型评估算法
对一个格基身份签名方案的分析和改进
基于粗糙集和人工免疫的集成入侵检测模型
一种基于身份的智能电网认证模式
VANET中一种保护隐私的安全叫车协议
微博影响力评价研究
TIFAflow: Enhancing Traffic Archiving System with Flow Granularity for Forensic Analysis in Network Security
有限域上方程x~r=a的求解
基于覆盖网的协同式网络安全防护与分析系统
ICN体系结构与技术研究
物联网汇聚安全网关关键技术研究
高速网络流量管理系统研究
内容中心网络的隐私问题研究
基于特征码病毒扫描技术的研究
基于倒排列表的网流索引检索与压缩方法
一种基于大数据技术的舆情监控系统
Google Bigtable系统的可信性研究
会议论文
<span style="font-family:;font-size:10.5pt;">Cryptanalysis and improvement of a smar
<span style="font-family:;font-size:10.5pt;">Cryptanalysis and improvement of a smar
<span style="font-family: ;" lang="EN-US" New="" Times=""
<span style="font-family:"";font-size:10.5pt;"><span></span>Ge
<span style="font-family:"";font-size:10.5pt;"><span></span>Ge
<span style="color:black;font-family:"Times New Roman","serif&
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family:;font-size:10.5pt;">Detecting GPS Information Leakage in An
<span style="font-family:;font-size:10.5pt;">Detecting GPS Information Leakage in An
PriMatch: Fairness-aware Secure Friend Discovery Protocol in Mobile Social Network
PriMatch: Fairness-aware Secure Friend Discovery Protocol in Mobile Social Network
Leveraging Cloud Computing for Outsourced Privacy Preserving Aggregation in Multi-Domain Networks
Leveraging Cloud Computing for Outsourced Privacy Preserving Aggregation in Multi-Domain Networks
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures
Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures
POSTER: Location privacy leaking from spectrum utilization information in Database-driven Cognitive
POSTER: Location privacy leaking from spectrum utilization information in Database-driven Cognitive
Live streaming with content centric networking
Reality check of CCN routing using search processor
Parallelizing FIB lookup in content centric networking
Relative Interpersonal-Influence-Aware Routing in Buffer Constrained Delay-Tolerant Networks
Relative Interpersonal-Influence-Aware Routing in Buffer Constrained Delay-Tolerant Networks
RBRA: A simple and efficient rating-based recommender algorithm to cope with sparsity in recommender
<span style="color: black; font-family: ;" Roman?,?serif?;font-size:10.5pt;?="&quo
<span style="font-family: ; font-size: 10.5pt;" color:black;?="">A Resourc
Large-scale emulation for Content Centric Network
Anonymous identity-based hash proof system and its applications
Anonymous identity-based hash proof system and its applications
Privacy-Preserving Decentralized Access Control for Cloud Storage Systems
Efficient trust based information sharing schemes over distributed collaborative networks
Efficient trust based information sharing schemes over distributed collaborative networks
YouSense: Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
YouSense: Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
Anonymous identity-based hash proof system and its applications
Anonymous identity-based hash proof system and its applications
Identity-based extractable hash proofs and their applications
Identity-based extractable hash proofs and their applications
4P_VES: a Collusion-Resistant Accountable Virtual Economy System
4P_VES: a Collusion-Resistant Accountable Virtual Economy System
<span style="font-family:; font-size: 10.5pt;" color:black;"="">YouSe
<span style="font-family:; font-size: 10.5pt;" color:black;"="">YouSe
BDK:Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks
BDK:Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks
CCA secure IB-KEM from the computational bilinear Diffie-Hellman assumption in the standard model
CCA secure IB-KEM from the computational bilinear Diffie-Hellman assumption in the standard model
<span style="font-family:;font-size:10.5pt;">User Self-controllable Profile Matching
<span style="font-family:;font-size:10.5pt;">User Self-controllable Profile Matching
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family:; font-size: 10.5pt;" color:black;"="">YouSe
<span style="font-family:; font-size: 10.5pt;" color:black;"="">YouSe
<span style="color: black; font-family:;" roman","serif";font-size:10.5p
A data structure for content cache management in content-centric networking
Location privacy preservation in collaborative spectrum sensing
Location privacy preservation in collaborative spectrum sensing
Relative Interpersonal-Influence-Aware Routing in Buffer Constrained Delay-Tolerant Networks
Relative Interpersonal-Influence-Aware Routing in Buffer Constrained Delay-Tolerant Networks
<span style="color: black; font-family: ;" Roman?,?serif?;font-size:10.5pt;?="&quo
<span style="font-family: ;" lang="EN-US" New="" Times=""
Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures
Location Privacy in Database-driven Cognitive Radio Networks: Attacks and Countermeasures
<span style="font-family:;font-size:10.5pt;">User Self-controllable Profile Matching
<span style="font-family:;font-size:10.5pt;">User Self-controllable Profile Matching
Garlic: A distributed botnets suppression system
CCA secure IB-KEM from the computational bilinear Diffie-Hellman assumption in the standard model
CCA secure IB-KEM from the computational bilinear Diffie-Hellman assumption in the standard model
Location privacy preservation in collaborative spectrum sensing
Location privacy preservation in collaborative spectrum sensing
YouSense: Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
YouSense: Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on e
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on e
Reformat named data networking with cryptographic message syntax
<span style="font-family:;font-size:10.5pt;">Cryptanalysis and improvement of a smar
<span style="font-family:;font-size:10.5pt;">Cryptanalysis and improvement of a smar
Concurrency Optimized Task Scheduling for Workflows in Cloud
Efficient trust based information sharing schemes over distributed collaborative networks
Efficient trust based information sharing schemes over distributed collaborative networks
Identity-based extractable hash proofs and their applications
Identity-based extractable hash proofs and their applications
Leveraging Cloud Computing for Outsourced Privacy Preserving Aggregation in Multi-Domain Networks
Leveraging Cloud Computing for Outsourced Privacy Preserving Aggregation in Multi-Domain Networks
POSTER: Location privacy leaking from spectrum utilization information in Database-driven Cognitive
POSTER: Location privacy leaking from spectrum utilization information in Database-driven Cognitive
BDK:Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks
BDK:Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on e
Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on e
<span style="font-family:;font-size:10.5pt;">Detecting GPS Information Leakage in An
<span style="font-family:;font-size:10.5pt;">Detecting GPS Information Leakage in An
CAVD:A Traffic-Camera Assisted Live Video Streaming Delivery Strategy in Vehicular Ad Hoc Networks
Two-level path authentication in EPC global network
Two-level path authentication in EPC global network
A novel workflow based data processing platform as a service
<span style="font-family:;font-size:10.5pt;">An ElGamal-based efficient and privacy-
<span style="font-family:;font-size:10.5pt;">An ElGamal-based efficient and privacy-
4P_VES: a Collusion-Resistant Accountable Virtual Economy System
4P_VES: a Collusion-Resistant Accountable Virtual Economy System
<span style="color: black; font-family: ;" Roman?,?serif?;font-size:10.5pt;?="&quo
Two-level path authentication in EPC global network
Two-level path authentication in EPC global network
<span style="font-family:;font-size:10.5pt;">An ElGamal-based efficient and privacy-
<span style="font-family:;font-size:10.5pt;">An ElGamal-based efficient and privacy-
<span style="font-family:"";font-size:10.5pt;"><span></span>Ge
<span style="font-family:"";font-size:10.5pt;"><span></span>Ge
<span style="font-family: ;" lang="EN-US" new="" times=""
<span lang="EN-US" style="font-family: "Times New Roman",&qu
High speed traffic archiving system for flow granularity storage and querying
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
<span style="font-family: ;" roman?,?serif?;font-size:10.5pt;?="" times="
曹珍富的项目
基于移动代理的密码理论体系及其应用
期刊论文 43
会议论文 13
著作 1
二次域密码、门限密钥托管及其应用
期刊论文 2
下一代互联网安全与隐私关键性技术的研究
期刊论文 2
信息安全协议分析新方法
期刊论文 126
会议论文 100
计算机通信
期刊论文 108
会议论文 31
著作 6
云通信中密文访问控制的可撤销技术
期刊论文 3
2002中韩双边电子商务及安全研讨会
通信系统安全的属性基密码技术
期刊论文 27
会议论文 10
身份基密钥交换协议的新研究
期刊论文 32
会议论文 14
密钥协商协议的可证安全模型和无公开参数新技术
期刊论文 1