您当前的位置:
首页 >
文章列表页 >
Encrypted image retrieval in multi-key settings based on edge computing
Topics: Key Technologies of Edge Computing | 更新时间:2024-06-05
    • Encrypted image retrieval in multi-key settings based on edge computing

    • Journal on Communications   Vol. 41, Issue 4, Pages: 14-26(2020)
    • DOI:10.11959/j.issn.1000-436x.2020086    

      CLC: TP309
    • Online First:2020-04

      Published:25 April 2020

    移动端阅览

  • Yingying LI, Jianfeng MA, Yinbin MIAO. Encrypted image retrieval in multi-key settings based on edge computing[J]. Journal on Communications, 2020, 41(4): 14-26. DOI: 10.11959/j.issn.1000-436x.2020086.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1375

下载量

2

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
K-Means clustering outsourcing scheme based on sparse matrix transformation and bounded random perturbation
Blockchain-based user-friendly data retrieval and sharing scheme in cloud-assisted industrial Internet of things
Fairly verifiable multi-user homomorphic proxy re-encryption scheme
Electronic medical records sharing solution based on Hyperledger Fabric

Related Author

Yafei WANG
Chunfu JIA
Ruiqi LI
Lai Mingzhu
Yang Wu
Han Shuai
Wang Huanran
Tan Jingwen

Related Institution

College of Cyber Science, Nankai University
Tianjin Key Laboratory of Network and Data Security Technology
School of Mathematics and Statistics, Hainan Normal University
School of Computer Science and Technology, Harbin Engineering University
Shandong Key Laboratory of Ubiquitous Intelligent Computing, University of Jinan
0