咨询与建议

限定检索结果

文献类型

  • 26 篇 期刊文献
  • 8 篇 会议

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 31 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 10 篇 软件工程
    • 9 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
  • 2 篇 理学
    • 2 篇 生物学
    • 1 篇 化学

主题

  • 34 篇 conditional prox...
  • 8 篇 chosen-ciphertex...
  • 6 篇 proxy re-encrypt...
  • 6 篇 cloud computing
  • 5 篇 attribute-based ...
  • 3 篇 internet of thin...
  • 3 篇 data sharing
  • 3 篇 identity-based p...
  • 2 篇 data security
  • 2 篇 without random o...
  • 2 篇 keyword search
  • 2 篇 chosen-ciphertex...
  • 2 篇 identity-based
  • 2 篇 receivers
  • 2 篇 blockchain
  • 2 篇 protocols
  • 2 篇 encryption
  • 2 篇 user revocation
  • 1 篇 emr sharing
  • 1 篇 secret sharing

机构

  • 7 篇 nanjing univ aer...
  • 4 篇 jinan univ dept ...
  • 3 篇 singapore manage...
  • 3 篇 beijing univ pos...
  • 3 篇 beijing univ pos...
  • 2 篇 jiangsu univ tec...
  • 2 篇 univ wollongong ...
  • 1 篇 kennesaw state u...
  • 1 篇 nanjing univ aer...
  • 1 篇 inst infocomm re...
  • 1 篇 natl univ def te...
  • 1 篇 astri secur & da...
  • 1 篇 innopolis univ i...
  • 1 篇 zhejiang gongsha...
  • 1 篇 university of so...
  • 1 篇 nit warangal dep...
  • 1 篇 hanyang univ dep...
  • 1 篇 yangzhou univ de...
  • 1 篇 east china norma...
  • 1 篇 jinan univ coll ...

作者

  • 7 篇 ge chunpeng
  • 6 篇 fang liming
  • 5 篇 weng jian
  • 5 篇 wang jiandong
  • 5 篇 susilo willy
  • 4 篇 yang yixian
  • 4 篇 huang qinlong
  • 3 篇 deng robert h.
  • 2 篇 kim donghyun
  • 2 篇 liang kaitai
  • 2 篇 fu jingyi
  • 2 篇 yue wei
  • 2 篇 ren yongjun
  • 2 篇 wong duncan s.
  • 2 篇 choo kim-kwang r...
  • 2 篇 yang yanjiang
  • 2 篇 chu cheng-kang
  • 2 篇 oh heekuck
  • 2 篇 liu joseph k.
  • 2 篇 hussain rasheed

语言

  • 33 篇 英文
  • 1 篇 其他
检索条件"主题词=conditional proxy re-encryption"
34 条 记 录,以下是31-40 订阅
排序:
Privacy-preserving pathological data sharing among multiple remote parties
收藏 引用
Blockchain(research and Applications) 2024年 第3期5卷 67-77页
作者: Wei Wu Fulong Chen Pinghai Yuan Taochun Wang Dong Xie Chuanxin Zhao Chao Wang Detao Tang Jingtao Li Ji Zhang Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal University241002 WuhuChina University of Southern Queensland 4350 QLDAustralia
The sharing of pathological data is highly important in various applications,such as remote diagnosis,graded diagnosis,illness treatment,and specialist system ***,ensuring reliable,secure,privacy-preserving,and effici... 详细信息
来源: 评论
EMRShareChain: A Privacy-Preserving EMR Sharing System Model Based on the Consortium Blockchain  18th
EMRShareChain: A Privacy-Preserving EMR Sharing System Model...
收藏 引用
18th International Symposium on Bioinformatics research and Applications (ISBRA)
作者: Zhang, Xinglong Xi, Peng Liu, Wenjuan Peng, Shaoliang Hunan Univ Coll Comp Sci & Elect Engn Changsha 410082 Peoples R China
Electronic medical record (EMR) Sharing can reduce duplicate medical tests, reduce treatment costs and improve the quality of medical services. However, most medical organizations currently use the internal network to... 详细信息
来源: 评论
A blockchain-based fine-grained data sharing scheme for e-healthcare system
收藏 引用
JOURNAL OF SYSTEMS ARCHITECTUre 2022年 第0期132卷
作者: Lin, Gaofan Wang, Haijiang Wan, Jian Zhang, Lei Huang, Jie Zhejiang Univ Sci & Technol Sch Informat & Elect Engn Zhejiang Peoples R China
The cloud-aided sharing of e-healthcare data has great positive significance for research. However, due to the privacy consideration, these data are usually encrypted before uploading to the cloud server which impedes... 详细信息
来源: 评论
Flexible, Efficient, and Secure Access Delegation in Cloud Computing
收藏 引用
ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS 2019年 第1期10卷 2-2页
作者: Xiong, Hu Wang, Yi Li, Wenchao Chen, Chien-Ming Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Sichuan Peoples R China Shandong Univ Sci & Technol Coll Comp Sci & Engn Qingdao 266590 Shandong Peoples R China
The convenience of the cloud-assisted Internet of Things has led to the need for improved protections for the large volumes of data collected from devices around the world and stored on cloud-based servers. proxy re-e... 详细信息
来源: 评论