咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 35 篇 期刊文献

馆藏范围

  • 85 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54 篇 工学
    • 45 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 14 篇 信息与通信工程
    • 10 篇 网络空间安全
    • 5 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 动力工程及工程热...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 20 篇 理学
    • 17 篇 数学
    • 7 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 12 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 4 篇 法学
    • 2 篇 法学
    • 2 篇 社会学
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 7 篇 blockchain
  • 5 篇 data privacy
  • 5 篇 security
  • 5 篇 game theory
  • 5 篇 cloud computing
  • 5 篇 privacy
  • 4 篇 authentication
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 computational mo...
  • 3 篇 smart contract
  • 3 篇 feature extracti...
  • 3 篇 protocols
  • 3 篇 encryption
  • 3 篇 robustness
  • 2 篇 smart contracts
  • 2 篇 deep learning
  • 2 篇 channel capacity
  • 2 篇 graph neural net...
  • 2 篇 differential pri...

机构

  • 17 篇 state key labora...
  • 11 篇 advanced cryptog...
  • 8 篇 guangxi key labo...
  • 8 篇 institute of cry...
  • 7 篇 guizhou universi...
  • 6 篇 school of cybers...
  • 6 篇 guilin universit...
  • 6 篇 college of compu...
  • 5 篇 state key labora...
  • 5 篇 weifang universi...
  • 4 篇 dazhou key labor...
  • 4 篇 fujian provincia...
  • 4 篇 guangxi key labo...
  • 4 篇 blockchain labor...
  • 3 篇 guangxi key labo...
  • 3 篇 school of cyber ...
  • 3 篇 institute of cry...
  • 3 篇 institute of cry...
  • 2 篇 college of big d...
  • 2 篇 school of crypto...

作者

  • 12 篇 chen yuling
  • 12 篇 tian youliang
  • 9 篇 youliang tian
  • 5 篇 huang yuanyuan
  • 5 篇 wu yongtang
  • 5 篇 li tao
  • 5 篇 yuanyuan huang
  • 4 篇 xiong jinbo
  • 3 篇 tan weijie
  • 3 篇 lu jiazhong
  • 3 篇 ma jianfeng
  • 3 篇 yang kedi
  • 3 篇 qian xiaobin
  • 3 篇 changgen peng
  • 3 篇 wang yilei
  • 3 篇 zhou huiyu
  • 2 篇 wang chenli
  • 2 篇 min tang
  • 2 篇 baohua qiang
  • 2 篇 jiazhong lu

语言

  • 81 篇 英文
  • 4 篇 其他
检索条件"机构=Cryptography and Data Security Laboratory"
85 条 记 录,以下是71-80 订阅
排序:
Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing
Attribute-Based Searchable Encryption Scheme Supporting Effi...
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Yuan Li Haiyan Wang Shulan Wang Yong Ding College of Computer Science and Software Engineering Shenzhen University Shenzhen P. R. China Peng Cheng Laboratory Cyberspace Security Research Center Shenzhen P. R. China College of Big Data and Internet Shenzhen Technology University Shenzhen P. R. China Guangxi Key Laboratory of Cryptography Information Security Guilin P. R. China
With the widespread application of cloud computing technology, data privacy security problem becomes more serious. The recent studies related to searchable encryption (SE) area have shown that the data owners can shar... 详细信息
来源: 评论
AFCoin: A framework for digital fiat currency of central banks based on account model  14th
AFCoin: A framework for digital fiat currency of central ban...
收藏 引用
14th International Conference on Information security and Cryptology, Inscrypt 2018
作者: Tian, Haibo Chen, Xiaofeng Ding, Yong Zhu, Xiaoyan Zhang, Fangguo Guangdong Key Laboratory of Information Security School of Data and Computer Science Sun Yat-Sen University GuangzhouGuangdong510275 China Guangxi Key Laboratory of Cryptography and Information Security Guilin China Xidian University Xi’anShanxi710071 China
Currently, the technique choices of issuing digital fiat currencies include RSCoin, Corda and Quorum etc. RSCoin is specially designed for central banks based on Bitcoin. Corda and Quorum are permissioned distributed ... 详细信息
来源: 评论
Dynamic multi-key FHE in asymmetric key setting from LWE
TechRxiv
收藏 引用
TechRxiv 2021年
作者: Dong, Sen Chen, Yuling Li, Tao Wang, Yilei Zhou, Huiyu State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University Of Electronic Technology Guilin541004 China school of Qufu Normal University Qufu273165 China school of Informatics University of Leicester LeicesterLE1 7RH United Kingdom
Multi-key Fully homomorphic encryption (MFHE) schemes allow computation on the encrypted data under different keys. However, traditional multi-key FHE schemes based on Learning with errors (LWE) have the undesirable p... 详细信息
来源: 评论
DE-RSTC: A rational secure two-party computation protocol based on direction entropy
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Yuling Ma, Juan Wang, Xianmin Zhang, Xinyu Zhou, Huiyu State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University Of Electronic Technology Guilin541000 China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou510000 China University of Leicester LeicesterLe1 7RH United Kingdom
Rational secure multi-party computation (RSMC) means two or more rational parties to complete a function on private inputs. In the process, the rational parties choose strategies to maximize utility, which will cause ... 详细信息
来源: 评论
Erdős–Gyárfás conjecture for some families of Cayley graphs
收藏 引用
Aequationes Mathematicae 2018年 第1期92卷 1-6页
作者: Ghaffari, Mohammad Hossein Mostaghim, Zohreh Cryptography and Data Security Laboratory School of Mathematics Iran University of Science and Technology Tehran Iran
The Paul Erdős and András Gyárfás conjecture states that every graph of minimum degree at least 3 contains a simple cycle whose length is a power of two. In this paper, we prove that the conjecture hold... 详细信息
来源: 评论
Rational Delegation Learning Outsourcing Scheme Based on Game Theory
Rational Delegation Learning Outsourcing Scheme Based on Gam...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Kang Xiang Youliang Tian Sheng Gao Changgen Peng Weijie Tan Institute of Cryptography and Data Security Guizhou University Guiyang P. R. China School of Information Central University of Finance and Economics Beijing P. R. China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang P. R. China
At present, many enterprises or individuals with a lot of data are limited by their own computing power, so can't mine useful information from the data. To address this problem, this paper proposes a rational dele... 详细信息
来源: 评论
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators
Cooperative Game Model of Delegation Computing: Verifier Sep...
收藏 引用
IEEE Conference on Computer Communications Workshops, INFOCOM Wksps
作者: Duo Zhang Youliang Tian Linjie Wang Sheng Gao Jianfeng Ma State Key Laboratory of Public Big Data College of Computer Science and Technology College of Mathematics and Statistics Guizhou University Guiyang China State Key Laboratory of Public Big Data College of Computer Science and Technology Institute of Cryptography and Date Security Guizhou University Guiyang China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Information Central University of Finance and Economics Beijing China School of Cyber Engineering College of Computer Science and Technology Xi'dian University Xi'an China
In cloud computing, the delegation computation service is required because end users usually are resource-constrained, and at the same time the correctness of computing results needs to be verified. However, all the e... 详细信息
来源: 评论
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
Deep Learning for Password Guessing and Password Strength Ev...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Tao Zhang Zelei Cheng Yi Qin Qiang Li Lin Shi Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China Department of Computer and Information Technology Purdue University West Lafayette USA PLA Information Engineering University Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing.... 详细信息
来源: 评论
Correction to: A biometric cryptosystem scheme based on random projection and neural network
收藏 引用
Soft Computing 2021年 第11期25卷 7671-7671页
作者: Peng, Jialiang Yang, Bian Gupta, B. B. El-Latif, Ahmed A. Abd School of Data Science and Technology Heilongjiang University Harbin China Guangxi Key Laboratory of Cryptography and Information Security Guilin China Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway Computer Engineering Department NIT Kurukshetra Kurukshetra India Department of Computer Science and Information Engineering Asia University Taichung Taiwan Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom Egypt
A correction to this paper has been published: https://***/10.1007/s00500-021-05804-3
来源: 评论
Blockchain-Based Incentive Announcement System for Internet of Vehicles
Blockchain-Based Incentive Announcement System for Internet ...
收藏 引用
IEEE International Conference on Big data and Cloud Computing (BdCloud)
作者: Yang Yang Jialiang Chen Xianghan Zheng Ximeng Liu Wenzhong Guo Hairong Lv College of Mathematics and Computer Science Fuzhou University Fuzhou China Guangxi Key Laboratory of Cryptography and Information Security Guangnxi China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University) Fuzhou China Ministry of Education Key Laboratory of Bioinformatics Bioinformatics Division and Center for Synthetic and Systems Biology Beijing National Research Center for Information Science and TechnologyDepartment of Automation Tsinghua University Beijing China
With the rapid development of computation and communication technologies, the traditional vehicle ad hoc networks (VANETs) are changing to Internet of vehicle (IoV). Vehicular announcement networks in IoV have been wi... 详细信息
来源: 评论