咨询与建议

限定检索结果

文献类型

  • 14 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 16 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 7 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 2 篇 石油与天然气工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 信息与通信工程
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
  • 4 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 16 篇 secure multi-par...
  • 6 篇 blockchain
  • 5 篇 homomorphic encr...
  • 3 篇 secret sharing
  • 2 篇 iot
  • 2 篇 differential pri...
  • 2 篇 distributed comp...
  • 2 篇 privacy
  • 1 篇 full homomorphic...
  • 1 篇 intelligent inte...
  • 1 篇 functional encry...
  • 1 篇 data security
  • 1 篇 genome-wide asso...
  • 1 篇 precision medici...
  • 1 篇 biomedical data ...
  • 1 篇 node trust degre...
  • 1 篇 cryptographic ha...
  • 1 篇 privacy protecti...
  • 1 篇 isolation forest
  • 1 篇 qr code encoding

机构

  • 1 篇 institute of sec...
  • 1 篇 southeast univ s...
  • 1 篇 shanghai institu...
  • 1 篇 sun yat sen univ...
  • 1 篇 division of rese...
  • 1 篇 aalborg univ dep...
  • 1 篇 tech univ munich...
  • 1 篇 state grid chong...
  • 1 篇 shanghai maritim...
  • 1 篇 school of cybers...
  • 1 篇 state st technol...
  • 1 篇 univmed berlin b...
  • 1 篇 psl res univ ins...
  • 1 篇 res ctr intellig...
  • 1 篇 zhejiang univ sc...
  • 1 篇 cyberspace secur...
  • 1 篇 anhui polytech u...
  • 1 篇 henan key labora...
  • 1 篇 chongqing univ p...
  • 1 篇 tech univ munich...

作者

  • 2 篇 prasser fabian
  • 1 篇 siqi lu
  • 1 篇 li yang
  • 1 篇 azencott c. -a.
  • 1 篇 wang licheng
  • 1 篇 deng han
  • 1 篇 zou xin
  • 1 篇 xie guanghuan
  • 1 篇 liu dinghao
  • 1 篇 chen c. l. phili...
  • 1 篇 zhong jiayong
  • 1 篇 wang cheng
  • 1 篇 li zhuo
  • 1 篇 wu chongchong
  • 1 篇 meurers thierry
  • 1 篇 liu yuan
  • 1 篇 wu zongbo
  • 1 篇 zhou ri-gui
  • 1 篇 duan binbin
  • 1 篇 ma dongchao

语言

  • 16 篇 英文
检索条件"主题词=Secure Multi-Party Computing"
16 条 记 录,以下是1-10 订阅
排序:
Privacy-Preserving Electric Vehicle Charging Recommendation by Incorporating Full Homomorphic Encryption and secure multi-party computing
收藏 引用
WORLD ELECTRIC VEHICLE JOURNAL 2024年 第10期15卷 446页
作者: Liu, Yiqi Ju, Jiaxin Li, Zhiyi Zhejiang Univ Sch Elect Engn Hangzhou 310027 Peoples R China
Electric vehicle (EV) charging recommendation can significantly improve global planning performance, corresponding to an increasing risk of privacy leakage. Based on this, this paper investigates the privacy data pres... 详细信息
来源: 评论
A trusted IoT data sharing method based on secure multi-party computation
收藏 引用
JOURNAL OF CLOUD computing-ADVANCES SYSTEMS AND APPLICATIONS 2024年 第1期13卷 1-14页
作者: Ma, Li Duan, Binbin Zhang, Bo Li, Yang Fu, Yingxun Ma, Dongchao North China Univ Technol Sch Informat Beijing 100144 Peoples R China
Edge computing nodes close to the perception layer of IoT systems are susceptible to data leaks and unauthorized access. To address these security concerns, this paper proposes a trusted IoT data sharing method based ... 详细信息
来源: 评论
Dynamic secure multi Broad Network for Privacy Preserving of Streaming Data
收藏 引用
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE 2024年 第4期8卷 3152-3165页
作者: Cao, Xiao-Kai Chen, Man-Sheng Wang, Chang-Dong Lai, Jian-Huang Huang, Qiong Chen, C. L. Philip Sun Yat sen Univ Sch Comp Sci & Engn Guangzhou 510275 Peoples R China Minist Educ Key Lab Machine Intelligence & Adv Comp Guangzhou 510275 Peoples R China South China Agr Univ Coll Math & Informat Guangzhou 510275 Peoples R China South China Univ Technol Sch Comp Sci & Engn Guangzhou 510275 Peoples R China
Distributed computing as a widely concerned research direction needs to use the data training model of users, making the security of users' private data become a challenging problem to be solved. At present, feder... 详细信息
来源: 评论
A privacy-preserving trading strategy for blockchain-based P2P electricity transactions
收藏 引用
APPLIED ENERGY 2023年 第1期335卷
作者: Wang, Beibei Xu, Lun Wang, Jialei Southeast Univ Sch Elect Engn Nanjing 210096 Peoples R China
With the rising demand for energy in distribution networks and the growing development of communication technology, peer-to-peer (P2P) electricity trading realized by blockchain technology not only promotes the partic... 详细信息
来源: 评论
Intelligent IoT Device Abnormal Traffic Detection Method Based on secure multi-party Computation  3
Intelligent IoT Device Abnormal Traffic Detection Method Bas...
收藏 引用
3rd Asian Conference on Frontiers of Power and Energy
作者: Zhong, Jiayong Wu, Chongchong Liu, Dinghao Shen, Zhenghua Wang, Xuewen State Grid Chongqing Elect Power Res Inst Chongqing Peoples R China State Grid Chongqing Elect Power Co Informat & Commun Branch Chongqing Peoples R China
The traditional Intelligent Internet of Things (IIoT) system has the problems of low detection efficiency, high cost, and difficulty in ensuring accuracy in detecting Abnormal Traffic Detection (ATD) of equipment, mak... 详细信息
来源: 评论
secure multi-party convex hull protocol based on quantum homomorphic encryption
收藏 引用
QUANTUM INFORMATION PROCESSING 2022年 第1期22卷 1-12页
作者: Wang, Cheng Zhou, Ri-Gui Shanghai Maritime Univ Coll Informat Engn Shanghai 201306 Peoples R China Res Ctr Intelligent Informat Proc & Quantum Intell Shanghai 201306 Peoples R China
secure multi-party computational geometry (SMCG) is a branch of secure multi-party computing (SMC). The protocol is designed for secure multi-party convex hull computation in SMCG. Firstly, a secure two-party value co... 详细信息
来源: 评论
A secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism
收藏 引用
Intelligent Automation & Soft computing 2023年 第9期37卷 2609-2626页
作者: Jian Shang Runmin Guan Wei Wang College of Computer and Information Hohai UniversityNanjing211100China Division of Research and Innovation Jiayuan Technology Co.Ltd.Nanjing211100China
The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent *** real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withs... 详细信息
来源: 评论
Research on data privacy protection methods based on genome-wide association study
收藏 引用
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS 2022年 第1期15卷 1-8页
作者: Wu, Zongbo Xiao, Wenhui Deng, Han Yang, Lan Quanzhou Univ Informat Engn Sch Software Quanzhou Fujian Peoples R China Cent South Univ Sch Comp Sci & Engn Changsha Hunan Peoples R China Guangzhou Coll Technol & Business Big Data Dev & Res Ctr Guangzhou 528138 Peoples R China
The deployment of genome-wide association study (GWAS) requires a large amount of genomic data to support statistical analysis to obtain reliable prediction results. However, the data used in the research and the stat... 详细信息
来源: 评论
A survey of the fusion of traditional data security technology and blockchain
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2024年 第PartA期252卷
作者: Xu, Yuqing Xu, Guangxia Liu, Yong Liu, Yuan Shen, Ming Anhui Polytech Univ Sch Comp & Informat Wuhu 241000 Anhui Peoples R China Chongqing Univ Posts & Telecommun Sch Comp Sci & Technol Chongqing 400065 Peoples R China Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou 510006 Peoples R China Aalborg Univ Dept Elect Syst DK-9220 Aalborg Denmark
Blockchain is a new distributed infrastructure and computing paradigm, which has been widely used in various fields. For example, utilizing a chain data structure to verify and restore data, using a distributed node c... 详细信息
来源: 评论
Blockchain multi-signature Wallet System Based on QR Code Communication  1
收藏 引用
5th CCF China Blockchain Conference (CBCC)
作者: Zhang, Hongxin Zou, Xin Xie, Guanghuan Li, Zhuo Zhejiang Univ Coll Comp Sci & Technol Hangzhou 310058 Peoples R China State St Technol Zhejiang Ltd Global Technol Serv Hangzhou 310013 Peoples R China
In order to avoid the risk of theft and loss of the private key of the blockchain wallet, a novel secure and stable blockchain multi-party signature system combining software and hardware is proposed. First, at the so... 详细信息
来源: 评论