欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
立项数据库
> 立项详情页
数字社区无线网络信息融合安全理论及关键技术研究
项目名称:数字社区无线网络信息融合安全理论及关键技术研究
项目类别:联合基金项目
批准号:U1135002
项目来源:国家自然科学基金
研究期限:1900-01-01-1900-01-01
项目负责人:马建峰
依托单位:西安电子科技大学
批准年度:2011
成果综合统计
成果类型
数量
期刊论文
会议论文
专利
获奖
著作
137
35
0
8
1
期刊论文
LTPPM: a location and trajectory privacy protection mechanism in participatory sensing
An Enhanced Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
基于位置密钥交换的 UC 安全模型
以社区域为中心基于信任的访问控制
密文策略的权重属性基加密方案
MAP: Towards Authentication for Multiple Tags
基于属性的可净化签名方案
Provable ownership of files in deduplication cloud storage
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiati
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encrypt
Access control requirements for structured document in cloud computing
Analyzing mechanism-based attacks in privacy-preserving data publishing
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks
两个多服务器架构下动态认证协议的安全性分析(英文)
基于改进SEIR模型的SNS信息传播稳定性分析(英文)
A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital c
一种非合作博弈下的无线网络接入选择方法
Attribute Based Multi-Signature Scheme for Wireless Communications
Efficient attribute based sequential aggregate signature for wireless sensor networks
云计算环境中组合文档模型及其访问控制方案
Trust-based service composition in multi-domain environments under time constraint
LBSs中面向协同位置隐私保护的群组最近邻查询
云计算中一种安全的电子文档自毁方案
Provable Ownership of Encrypted Files in De-duplication Cloud Storage
Enhancing traffic capacity of scale-free networks by employing hybrid routing strategy
PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud
CL-TAP: An efficient certificateless based trusted access protocol for WLAN
云中基于常数级密文属性基加密的访问控制机制
面向多服务器架构的认证协议分析与改进
一种素数阶群上构造的自适应安全的多授权机构CP-ABE方案
视频数据库多级访问控制
安全协议多目标语言代码自动化实现方案
无线传感器网络k度覆盖控制算法
Large universe decentralized key-policy attribute-based encryption
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification
ANew Unsupervised Feature Ranking Method for Gene Expression Data Based onConsensus Affinity
A K-Median Facility Location Agent for Low-Cost Service Selection in Digital Community Network
Energy-Balanced Data Gathering and Aggregating in WSNs: A Compressed Sensing Scheme
Stability Analysis of Information Spreading on SNS Based on Refined SEIR Model
Improvement of robust smart-card-based password authentication scheme
基于重构顺序调整机制的理性秘密共享方案
LBS中面向协同位置隐私保护的群组最近邻查询
室内定位系统中指纹库的优化方法
无线网络中身份认证协议选择方法
新的车辆远程诊断授权协议
一种利用手指图像测量人体心率的方法
基于模型检测的服务链信息流安全可组合验证方法
基于接口精化的广义无干扰性研究
Efficient and Privacy-Preserving Skyline Computation Framework across Domains
Bayesian mechanism for rational secret sharing scheme
On the Outage Probability of Device-to-Device Communication Enabled Multi-Channel Cellular Networks:
Abdulhameed Alelaiwi. Robust extended chaotic maps-based three-factor authentication scheme preservi
A privacy preserving three-factor authentication protocol for e-health clouds
Cryptanalysis of Two Dynamic Identity Based Authentication Schemes for Multi-Server Architecture
An approach to quality assessment for Web service selection based on the analytic hierarchy process
A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server&apos
Secure service composition with information flow control in service clouds
Automated enforcement for relaxed information release with reference points
基于SEIR的社交网络信息传播模型
基于博弈论的移动自组织网络的信任管理方法
面向虚拟社区物联网的信任推荐算法
云计算环境下基于CCP-ABE的访问控制机制
可伸缩视频流的安全网络编码方案
基于行为的结构化文档多级访问控制
Improvement of robust smart ‐ card ‐ based password authentication scheme
基于博弈论的身份认证协议的分析——NGUYEN L H方案的改进
A Universal Framework for Dynamic Evaluation of Fairness under Cloud Computing
Device-to-device communications for enhancing quality of experience in software defined multi-tier L
On Key Evolution over Wireless Channels
Survey on cyberspace security
三维集成技术的现状和发展趋势
基于博弈论的身份认证协议的分析——NGUYENLH方案的改进
支持树形访问结构的多权威基于属性的签名方案
支持动态策略更新的半策略隐藏属性加密方案
无证书连接关键字密文检索
关键字域可变的可验证密文检索
高效的可验证多关键字密文检索
保护隐私的轻量级云数据共享方案
MANET安全路由协议自动化分析
服务组合中保障公平性的信誉传播算法
采用攻击策略图的实时警报综合分析方法
标准模型下隐私保护的多因素密钥交换协议?
会议论文
CRVad: Confidential Reasoning and Verification towards Secure Routing in Ad Hoc Networks
A Stochastic Geometry Analysis of D2D Overlaying Multi-Channel Downlink Cellular Networks
PRAM : privacy preserving access management scheme in cloud services
Ciphertext - Policy Weighted Attribute Based Encryption for Fine - Grained Access Control
Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Comput
Trustworthy Service Composition in Service-oriented Mobile Social Networks
Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Co
Content Based Spam Text Classification: An Empirical Comparison between English and Chinese
PRAM: Privacy preserving access management scheme in cloud services
Device-to-Device Communication Overlaying Two-Hop Multi-Channel Uplink Cellular Networks
A Trusted Authentication Scheme for Wireless Networks using Direct Anonymous Attestation
Efficient Data Integrity Verification Using Attribute Based Multi-Signature Scheme in Wireless Netwo
A Demand-Aware Location Privacy Protection Scheme in Continuous Location-based Services
An Efficient WLAN Initial Access Authentication Protocol
Efficient data integrity verification using attribute based multi - signature scheme in wireless net
A secure document self-destruction scheme: An ABE approach
A Secure Document Self - Destruction Scheme with Identity Based Encryption
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security
Verifying Location-based Services with Declassification Enforcement
GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks
Data Owner Based Attribute Based Encryption
GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing
Service Composition in Multi-domain Environment under Time Constraint
A secure document self-destruction scheme with identity based encryption
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control
Data gathering and processing for large-scale wireless sensor networks
Continuous Context-Aware Device Comfort Evaluation Method
New Compact CCA Secure Elgamal Scheme in the Random Oracle Model
AnApproximate Optimal Coverage Set Algorithm in Wireless Sensor Networks
Verifying Secure Interface Composition for Component-based System Designs
Multi-domain Direct Anonymous Attestation Scheme from Pairings
Game Optimization for Time - Critical Multicast Data Origin Authentication : Trade Off between Secur
Fully Secure Decentralized Key - Policy Attribute - Based Encryption
获奖
基于可信计算的无线局域网安全管理技术及方法
异构多域无线网络协同安全关键技术及应用
复杂网络环境下服务安全提供方法及关键技术
泛在网信息汇聚及安全保护关键技术
基于可信计算的无线局域网安全管理技术及方法
异构多域无线网络协同安全关键技术及应用
复杂网络环境下服务安全提供方法及关键技术
泛在网信息汇聚及安全保护关键技术
著作
信息安全等级保护攻略
马建峰的项目
可证安全的多方安全协议的分析与设计
期刊论文 99
会议论文 7
著作 2
宽带无线IP网安全技术研究
专用VLSI处理机阵列容错设计方法的研究
期刊论文 8
著作 1
网络与信息安全关键技术
面向异构物联网的安全融合理论及关键技术研究
期刊论文 37
异构无线网络安全融合关键技术研究
宽带无线IP网安全技术研究
网络与信息安全关键技术
期刊论文 32
第38届夏威夷系统科学国际会议
异构无线网络安全融合关键技术研究
容忍入侵的入侵检测模型与检测方法研究
期刊论文 74
会议论文 22
获奖 2
著作 3
异构无线网络安全融合关键技术研究
自组织可重构的空间信息网安全组网技术研究
期刊论文 60
2005年计算智能与安全国际学术会议