吉林大学学报(工学版) ›› 2018, Vol. 48 ›› Issue (2): 551-557.doi: 10.13229/j.cnki.jdxbgxb20171141
Previous Articles Next Articles
HAN Jia-wei1, 2, LIU Yan-heng1, 3, SUN Xin3, SONG Li-jun2
CLC Number:
[1] Wang X A, Ma J,Xhafa F, et al. Cost-effective secure E-health cloud system using identity based cryptographic techniques[J]. Future Generation Computer Systems, 2017, 67: 242-254. [2] Zhou Y, Deng H, Wu Q, et al. Identity-based proxy re-encryption version 2:making mobile access easy in cloud[J]. Future Generation Computer Systems, 2016, 62: 128-139. [3] Li J, Li JW, Chen X, et al. Identity-based encryption with outsourced revocation in cloud computing[J]. IEEE Transactions on Computers, 2015, 64(2): 425-437. [4] Boneh D, Franklin M. Identity based encryption from the Weil pairing [J]. SIAM Journal on Computing, 2001, 32(3): 213-229. [5] Boldyreva A, Goyal V, Kumar V. Identity-based encryption with efficient revocation[C]∥ ACM Conference on Computer and Communications Security, ACM,Alexandria USA,2008: 417-426. [6] Alléaume R, Branciard C, Bouda J, et al. Using quantum key distribution for cryptographic purposes:a survey[J]. Theoretical Computer Science, 2014, 560: 62-81. [7] 郭光灿, 张昊, 王琴. 量子信息技术发展概况[J]. 南京邮电大学学报:自然科学版, 2017, 37(3): 1-14. Guo Guang-can, Zhang Hao, Wang Qin. Review on development of quantum information technology[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2017, 37(3): 1-14. [8] Fröhlich B, Dynes J F, Lucamarini M, et al. A quan-tum access network[J]. Nature, 2013, 501 (7465): 69-72. [9] Jasim O K, Abbas S, El-Horbaty E S M, et al. Cryptographic cloud computing environment as a more trusted communication environment[J]. International Journal of Grid & High Performance Computing, 2014, 6(2): 38-51. [10] Thayananthan V, Albeshri A. Big data security issues based on quantum cryptography and privacy with authentication for mobile data center[J]. Procedia Computer Science, 2015, 50: 149-156. [11] 韩家伟, 刘衍珩, 孙鑫,等. 基于滑动窗口的量子密钥管理算法[J]. 吉林大学学报:工学版, 2016, 46(2): 535-541. Han Jia-wei, Liu Yan-heng, Sun Xin, et al. Quantum key management algorithm based on sliding window[J]. Journal of Jilin University(Engineering and Technology Edition), 2016, 46(2): 535-541 [12] Fujiwara M, Domeki T, Moriai S, et al. Highly secure network switches with quantum key distribution systems[J]. International Journal of Network Security, 2015, 17(1): 34-39. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|