×
Verification Code:
换一张
Forgotten Password?
Stay signed in
×
Login
中文
|
English
BNBU
|
Library
Login
Register
Home
Publications
Faculty/School
Scholars
Analysis
Search
ALL
ORCID
Title
Creator
Date Issued
Keyword
Document Type
Original Document Type
Indexed By
Publisher
Status
Collection
Faculty of Science and Tech...
2
Research outside affiliated...
7
Authors
JIA Weijia
6
WANG Tian
2
EZE Uchenna Cyril
1
Document Type
Journal article
9
Conference paper
1
Date Issued
2024
1
2021
2
2017
1
2013
3
2012
1
2011
1
More...
Language
英语English
7
中文Chinese
3
Indexed By
SCIE
5
CSCD
3
中文核心期刊要目总览
3
EI
2
CPCI-S
1
CPCI-SSH
1
More...
Funding Organization
Keyword
Provable security
3
CDH问题
2
Security
2
Security model
2
Trust
2
identity-based cryptography
2
More...
Source Publication
Chinese Journal of Electron...
1
Computer Journal
1
Finance Research Letters
1
Fundamenta Informaticae
1
Information Sciences
1
Innovation and Knowledge Ma...
1
More...
Funding Project
×
Knowledge Map
Feedback
Browse/Search Results: 1-10 of 10
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
Twisted industrial structure, land financing mode and social security
Journal article
Finance Research Letters,2024, volume: 69
Authors:
Li, Guoying
;
Liu, Zhenhai
;
Liu, Tangsen
;
Chen, Li
Favorite
  |  
View/Download:3/0
  |  
Submit date:2024/11/04
Industrial structure distortion
Land financing model
Social security
STMTO: A smart and trust multi-UAV task offloading system
Journal article
Information Sciences,2021, volume: 573, pages: 519-540
Authors:
Guo, Jialin
;
Huang, Guosheng
;
Li, Qiang
;
Xiong, Neal N.
;
Zhang, Shaobo
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
Double auction model
Energy effective
Multi Unmanned Aerial Vehicles
Security
Task offloading
Trust
Edge-based auditing method for data security in resource-constrained Internet of Things
Journal article
Journal of Systems Architecture,2021, volume: 114
Authors:
Wang, Tian
;
Mei, Yaxin
;
Liu, Xuxun
;
Wang, Jin
;
Dai, Hong Ning
Favorite
  |  
View/Download:5/0
  |  
Submit date:2021/12/02
Audit model
Binary tree
Data security
Edge computing
Resource-constrained terminal
Identity-based multi-proxy signature scheme in the standard model
Journal article
Fundamenta Informaticae,2017, volume: 150, issue: 2, pages: 179-210
Authors:
Gu, Ke
;
Jia, Weijia
;
Zhang, Jianming
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/05/10
identity-based cryptography
identity-based multi-proxy signature
multi-proxy signature
security model
Secure and efficient proxy signature scheme in the standard model
Journal article
Chinese Journal of Electronics,2013, volume: 22, issue: 4, pages: 666-670
Authors:
Gu, Ke
;
Jia, Weijia
;
Chen, Rongyuan
;
Liu, Xingbao
Favorite
  |  
View/Download:4/0
  |  
Submit date:2021/05/10
Computational diffle-hellman (cdh) assumption
Efficiency
Provable security
Proxy signature
Security model
标准模型下基于身份的群代理签名方案
Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2013, volume: 50, issue: 7, pages: 1370-1386
Authors:
谷科
;
贾维嘉
;
李超良
;
陈荣元
Favorite
  |  
View/Download:4/0
  |  
Submit date:2021/05/10
CDH problem
Group proxy signature
Identity
Provable security
Security model
群代理签名
安全模型
可证安全性
身份
CDH问题
Efficient identity-based proxy signature in the standard model
Journal article
Computer Journal,2013, volume: 58, issue: 4, pages: 792-807
Authors:
Gu, Ke
;
Jia, Weijia
;
Jiang, Chunlin
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/05/10
efficiency
identity-based cryptography
identity-based proxy signature
proxy signature
security model
基于子项集时间序列的模式挖掘及其在Web安全上的应用
Journal article
小型微型计算机系统/Journal of Chinese Computer Systems,2012, volume: 33, issue: 9, pages: 1903-1907
Authors:
文晟
;
贾维嘉
;
周维
Favorite
  |  
View/Download:0/0
  |  
Submit date:2021/09/16
子项集
Web安全
sub-item
time series
model mining
Web security
时间序列
模式挖掘
高效安全的基于身份的签名方案
Journal article
软件学报/Journal of Software,2011, volume: 22, issue: 6, pages: 1350-1360
Authors:
谷科
;
贾维嘉
;
姜春林
Favorite
  |  
View/Download:6/0
  |  
Submit date:2021/05/10
CDHP
Computational efficiency
Provable security
Signature
Standard model
标准模型
签名
CDH问题
可证安全
计算性能
Modelling user trust and mobile payment adoption: A conceptual framework
Conference paper
Innovation and Knowledge Management in Business Globalization: Theory and Practice - Proceedings of the 10th International Business Information Management Association Conference, Kuala Lumpur, Malaysia, 30 June 2008 through 1 July 2008
Authors:
Eze, Uchenna Cyril
;
Gan, Gerald Goh Guan
;
Ademu, John
;
Tella, Samson A.
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/07/12
Conceptual model
Mobile payment
Security
Trust