×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
个人在本单位外知识产出
22
作者
陈钟
5
文献类型
期刊论文
16
会议论文
5
著作章节
1
发表日期
2024
1
2017
1
2016
4
2013
3
2012
1
2011
1
更多...
语种
英语English
21
中文Chinese
1
收录类别
CPCI-S
2
SCIE
1
资助机构
关键词
Wireless sensor networks
3
Security
2
Anonymity
1
Anonymous
1
Authentic consensus
1
CVSS
1
更多...
出处
China Communications
3
Jisuanji Yanjiu yu Fazhan/C...
3
International Journal of Ne...
2
Proceedings - 2015 IEEE 12t...
2
Beijing Daxue Xuebao (Ziran...
1
CFI ''16: Proceedings of th...
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共22条,第1-10条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
发表日期升序
发表日期降序
题名升序
题名降序
期刊影响因子升序
期刊影响因子降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes
会议论文
Proceedings - International Symposium on Software Reliability Engineering, ISSRE, jpn,Tsukuba, 2024-10-28——2024-10-28
作者:
Chen,Ziming
;
Li,Yue
;
Gao,Jianbo
;
Zhang,Jiashuo
;
Wang,Ke
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2025/08/05
chaincode
Hyperledger Fabric
privacy
private data collection
smart contract
vulnerability detection
Versatile routing and self-certifying features support for secure mobility in expressive internet architecture
期刊论文
China Communications,2017, 卷号: 14, 期号: 4, 页码: 73-88
作者:
Meng, Hongwei
;
Chen, Zhong
;
Hu, Jianbin
;
Song, Chuck
;
Tang, Cong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2025/08/05
expressive Internet architecture
future Internet architecture
mobility
security
self-certifying
面向SaaS云平台的安全漏洞评分方法研究
期刊论文
通信学报,2016, 卷号: 37, 期号: 8, 页码: 157-166
作者:
李舟
;
唐聪
;
胡建斌
;
陈钟
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2025/08/05
云服务
CVSS
SaaS
漏洞评分系统
Vulnerabilities scoring approach for cloud saas
会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, Beijing, China, 10-14 Aug. 2015
作者:
Li, Zhou
;
Tang, Cong
;
Hu, Jianbin
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2025/08/05
Making tagging systems resistant to tricky spam attacks
会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, Beijing, China, 10-14 Aug. 2015
作者:
Li, Zhou
;
Tang, Cong
;
Hu, Jianbin
;
Chen, Zhong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2025/08/05
Establish the intrinsic binding in naming space for future internet using combined public key
会议论文
CFI '16: Proceedings of the 11th International Conference on Future Internet Technologies, Nanjing, China, 2016-06-15——2016-06-15
作者:
Meng, Hongwei
;
Chen, Zhong
;
Hu, Jianbin
;
Guan, Zhi
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2025/08/05
Combined public key
Future Internet architecture
Identity authentication
Intrinsic security
Self-certifying
Research on countermeasures against tag spam
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 10, 页码: 2029-2043
作者:
Wang,Yonggang
;
Yan,Hanbing
;
Xu,Junfeng
;
Hu,Jianbin
;
Chen,Zhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2025/08/05
Countermeasures
Social network
Tag spam
Tagging service
Tagging system
Security flaw of an ECC-based signcryption scheme with anonymity
期刊论文
International Journal of Network Security,2013, 卷号: 15, 期号: 4, 页码: 317-320
作者:
Xiong,Hu
;
Hu,Jianbin
;
Chen,Zhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2025/08/05
Anonymous
Chosen plaintext attack
ECC-based cryptosystem
Signcryption
A practical dynamic integrity protection model
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 10, 页码: 2082-2091
作者:
Yang,Tao
;
Wang,Yonggang
;
Tang,Liyong
;
Kong,Lingbo
;
Hu,Jianbin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2025/08/05
Dynamic integrity level
Dynamic integrity protection model (DMIP)
Formal model
Integrity policy
Usable integrity
Further improvement of an authentication scheme with user anonymity for wireless communications
期刊论文
International Journal of Network Security,2012, 卷号: 14, 期号: 5, 页码: 297-300
作者:
Hu,Jianbin
;
Xiong,Hu
;
Chen,Zhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2025/08/05
Anonymity
Cryptanalysis
User authentication
Wireless communication