×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
个人在本单位外知识产出
21
作者
文献类型
期刊论文
15
会议论文
5
著作章节
1
发表日期
2024
1
2017
1
2016
3
2013
3
2012
1
2011
1
更多...
语种
英语English
21
收录类别
资助机构
关键词
Wireless sensor networks
3
Security
2
Anonymity
1
Anonymous
1
Authentic consensus
1
Chosen plaintext attack
1
更多...
出处
China Communications
3
Jisuanji Yanjiu yu Fazhan/C...
3
International Journal of Ne...
2
Proceedings - 2015 IEEE 12t...
2
ACM International Conferenc...
1
Beijing Daxue Xuebao (Ziran...
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共21条,第1-10条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
提交时间升序
提交时间降序
WOS被引频次升序
WOS被引频次降序
Understanding and Detecting Privacy Leakage Vulnerabilities in Hyperledger Fabric Chaincodes
会议论文
Proceedings - International Symposium on Software Reliability Engineering, ISSRE, jpn,Tsukuba, 2024-10-28——2024-10-28
作者:
Chen,Ziming
;
Li,Yue
;
Gao,Jianbo
;
Zhang,Jiashuo
;
Wang,Ke
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2025/08/05
chaincode
Hyperledger Fabric
privacy
private data collection
smart contract
vulnerability detection
Versatile routing and self-certifying features support for secure mobility in expressive internet architecture
期刊论文
China Communications,2017, 卷号: 14, 期号: 4, 页码: 73-88
作者:
Meng,Hongwei
;
Chen,Zhong
;
Hu,Jianbin
;
Song,Chuck
;
Tang,Cong
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2025/08/05
expressive Internet architecture
future Internet architecture
mobility
security
self-certifying
Making tagging systems resistant to tricky spam attacks
会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, chn,Beijing, 2015-08-10——2015-08-10
作者:
Li,Zhou
;
Tang,Cong
;
Hu,Jianbin
;
Chen,Zhong
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2025/08/05
Vulnerabilities scoring approach for cloud saas
会议论文
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015, chn,Beijing, 2015-08-10——2015-08-10
作者:
Li,Zhou
;
Tang,Cong
;
Hu,Jianbin
;
Chen,Zhong
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2025/08/05
Establish the intrinsic binding in naming space for future internet using combined public key
会议论文
ACM International Conference Proceeding Series, chn,Nanjing, 2016-06-15——2016-06-15
作者:
Meng,Hongwei
;
Chen,Zhong
;
Hu,Jianbin
;
Guan,Zhi
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
Combined public key
Future Internet architecture
Identity authentication
Intrinsic security
Self-certifying
A practical dynamic integrity protection model
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 10, 页码: 2082-2091
作者:
Yang,Tao
;
Wang,Yonggang
;
Tang,Liyong
;
Kong,Lingbo
;
Hu,Jianbin
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
Dynamic integrity level
Dynamic integrity protection model (DMIP)
Formal model
Integrity policy
Usable integrity
Research on countermeasures against tag spam
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, 卷号: 50, 期号: 10, 页码: 2029-2043
作者:
Wang,Yonggang
;
Yan,Hanbing
;
Xu,Junfeng
;
Hu,Jianbin
;
Chen,Zhong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
Countermeasures
Social network
Tag spam
Tagging service
Tagging system
Security flaw of an ECC-based signcryption scheme with anonymity
期刊论文
International Journal of Network Security,2013, 卷号: 15, 期号: 4, 页码: 317-320
作者:
Xiong,Hu
;
Hu,Jianbin
;
Chen,Zhong
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2025/08/05
Anonymous
Chosen plaintext attack
ECC-based cryptosystem
Signcryption
Further improvement of an authentication scheme with user anonymity for wireless communications
期刊论文
International Journal of Network Security,2012, 卷号: 14, 期号: 5, 页码: 297-300
作者:
Hu,Jianbin
;
Xiong,Hu
;
Chen,Zhong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/08/05
Anonymity
Cryptanalysis
User authentication
Wireless communication
On the security of an identity based multi-proxy signature scheme
期刊论文
Computers and Electrical Engineering,2011, 卷号: 37, 期号: 2, 页码: 129-135
作者:
Xiong,Hu
;
Hu,Jianbin
;
Chen,Zhong
;
Li,Fagen
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2025/08/05