Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Guoning Lv"'
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811534171
Aiming at the problems of limited computing power and high security requirements of terminal equipment, which affects people’s good experience on some network resources, we proposes a provably secure server-assisted verification threshold proxy re-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::926f3e62cfe1f5a14954a85d626a07bd
https://doi.org/10.1007/978-981-15-3418-8_4
https://doi.org/10.1007/978-981-15-3418-8_4
Publikováno v:
Smart Blockchain ISBN: 9783030057633
SmartBlock
SmartBlock
Blockchain technology in Bitcoin is a decentralized, de-trusted, open and transparent distributed data storage technology that can reduce trust costs and achieve secure and reliable data interaction. However, an attacker can easily obtain all the Bit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1a5cc6a24de0d94642cfcf089c8e0a11
https://doi.org/10.1007/978-3-030-05764-0_1
https://doi.org/10.1007/978-3-030-05764-0_1
Publikováno v:
Intelligent Computing Theories and Application ISBN: 9783319422909
ICIC (1)
ICIC (1)
Nowadays the logistics system has become an indispensable element for economic commerce activities, while information security is an important foundation in ensuring the development of electronic commerce logistics system. The purpose of this paper i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f2fffc4e98b94ca7d34c7b5c5d60f3c4
https://doi.org/10.1007/978-3-319-42291-6_60
https://doi.org/10.1007/978-3-319-42291-6_60
Publikováno v:
Intelligent Computing Theories and Application ISBN: 9783319422909
ICIC (1)
ICIC (1)
Historical disaster events are taken as a case for space-correlation analysis, three-dimensional disasters space-time complex network are modeled and chain relationship of disaster nodes are mined by looking for similar space vector in network. Then
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::374221229131b52ffd3638e5db6e1dca
https://doi.org/10.1007/978-3-319-42291-6_56
https://doi.org/10.1007/978-3-319-42291-6_56
Publikováno v:
Basic & Clinical Pharmacology & Toxicology. Apr2019 Supplement S3, Vol. 124, p3-379. 377p.
Publikováno v:
Intelligent Computing Theories & Application: 12th International Conference, ICIC 2016, Lanzhou, China, August 2-5, 2016, Proceedings, Part I; 2016, pI-XX, 20p
Selected, peer reviewed papers from the 2013 2nd International Conference on Information Technology and Management Innovation (ICITMI 2013), July 23-24, 2013, Zhuhai, China
Autor:
Dehuai Zeng
Selected, peer reviewed papers from the 2010 International Conference on Micro Nano Devices, Structure and Computing Systems (MNDSCS 2010), Singapore, November 6-7, 2010
This three-volume set of LNCS 14086, LNCS 14087 and LNCS 14088 constitutes - in conjunction with the double-volume set LNAI 14089-14090- the refereed proceedings of the 19th International Conference on Intelligent Computing, ICIC 2023, held in Zhengz
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019.The 22 revised full papers presented were carefully reviewed and selected fro