期刊文献+
共找到43,791篇文章
< 1 2 250 >
每页显示 20 50 100
低成本架设宽带应用新路——纵观茶山网络ACCESS“点点通”产品
1
《通讯世界》 2003年第3期79-79,共1页
在宽带应用领域,目前被采用的传统基带式MODEM的通信方式已能够为网络数据传输提供较高速率和稳定的环境,但却因无法降低的采购成本而把众多企业用户阻挡在宽带DDN的大门之外.为了打破传统基带式MODEM的价格瓶颈,众多数据网络通信设备... 在宽带应用领域,目前被采用的传统基带式MODEM的通信方式已能够为网络数据传输提供较高速率和稳定的环境,但却因无法降低的采购成本而把众多企业用户阻挡在宽带DDN的大门之外.为了打破传统基带式MODEM的价格瓶颈,众多数据网络通信设备开发制造厂商纷纷把眼光指向简单易行的点到点数据传输产品的解决方案上.在这方面,来自韩国的茶山网络凭借其ACCESS"点点通"产品走在了业界前列.依靠在性价比方面的整体优势,ACCESS"点点通"以其"两低一高"的出色表现为具有DDN宽带需求的企业用户找到了一条新道路. 展开更多
关键词 access“点点通” 网络通信设备 以太网桥接模式 宽带DDN 茶山网络公司
下载PDF
低成本架设宽带应用新方法 茶山网络ACCESS“点点通”产品
2
《电脑采购》 2003年第6期18-18,共1页
在宽带应用领域,目前被采用的传统基带式Modem的通信方式已能够为网络数据传输提供较高速率和稳定的环境,但却因无法降低的采购成本而把众多企业用户阻挡在宽带DDN的大门之外。为了打破传统基带式Modem的价格瓶颈,众多数据网络通讯设备... 在宽带应用领域,目前被采用的传统基带式Modem的通信方式已能够为网络数据传输提供较高速率和稳定的环境,但却因无法降低的采购成本而把众多企业用户阻挡在宽带DDN的大门之外。为了打破传统基带式Modem的价格瓶颈,众多数据网络通讯设备开发制造厂商纷纷把眼光指向简单易行的点到点数据传输产品的解决方案上。在这方面,来自韩国的茶山网络最近推出了AC-CESS“点点通”产品,将宽带DDN带入底层用户的大门。低门槛投资 ACCESS“点点通”提供了一个标准RJ-11接口,直接可以通过一对普通铜线实现双向高达2.3Mbps的对称数据流传输,同时确保数据传输的稳定性和封闭安全性。作为一种组合专用设备,ACCESS“点点通”可融合SDH、PDH、DDN等传输通道模式进行宽带通信,进一步增强了低成本下企业数据通讯架构的整体适应性。 展开更多
关键词 access 制造厂商 应用领域 网络数据传输 网络通讯设备 专用设备 低门槛 数据通讯 传输通道 通信方式
下载PDF
茶山网络ACCESS点点通产品
3
《现代电信科技》 2003年第1期54-54,共1页
关键词 access点点通产品 茶山网络公司 以太网 企业数据通信
下载PDF
低成本架设宽带应用新路——纵观茶山网络ACCESS-“点点通”产品及解决方案
4
作者 白士萍 《网络与信息》 2003年第2期99-99,共1页
关键词 局域网 网络数据传输 网络通讯设备 宽带 茶山网络 access "点点通"产品
下载PDF
A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things 被引量:1
5
作者 Hongliang Tian Junyuan Tian 《Computers, Materials & Continua》 SCIE EI 2024年第1期1297-1310,共14页
The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access cont... The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access control scheme is proposed.Firstly,writing the reputation value as an attribute into the access control policy,and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control;Secondly,storing a large amount of resources fromthe Internet of Things in Inter Planetary File System(IPFS)to improve system throughput;Finally,map resource access operations to qualification tokens to improve the performance of the access control system.Complete simulation experiments based on the Hyperledger Fabric platform.Fromthe simulation experimental results,it can be seen that the access control system can achieve more fine-grained and dynamic access control while maintaining high throughput and low time delay,providing sufficient reliability and security for access control of IoT devices. 展开更多
关键词 Blockchain IOT access control Hyperledger Fabric
下载PDF
Mapping and measuring urban-rural inequalities in accessibility to social infrastructures 被引量:1
6
作者 Chenmeng Guo Weiqi Zhou +1 位作者 Chuanbao Jing Dawa Zhaxi 《Geography and Sustainability》 CSCD 2024年第1期41-51,共11页
Equal access to social infrastructures is a fundamental prerequisite for sustainable development,but has long been a great challenge worldwide.Previous studies have primarily focused on the accessibility to social inf... Equal access to social infrastructures is a fundamental prerequisite for sustainable development,but has long been a great challenge worldwide.Previous studies have primarily focused on the accessibility to social infras-tructures in urban areas across various scales,with less attention to rural areas,where inequality can be more severe.Particularly,few have investigated the disparities of accessibility to social infrastructures between urban and rural areas.Here,using the Changsha-Zhuzhou-Xiangtan urban agglomeration,China,as an example,we investigated the inequality of accessibility in both urban and rural areas,and further compared the urban-rural difference.Accessibility was measured by travel time of residents to infrastructures.We selected four types of social infrastructures including supermarkets,bus stops,primary schools,and health care,which were funda-mentally important to both urban and rural residents.We found large disparities in accessibility between urban and rural areas,ranging from 20 min to 2 h.Rural residents had to spend one to two more hours to bus stops than urban residents,and 20 min more to the other three types of infrastructures.Furthermore,accessibility to multiple infrastructures showed greater urban-rural differences.Rural residents in more than half of the towns had no access to any infrastructure within 15 min,while more than 60%of the urban residents could access to all infrastructures within 15 min.Our results revealed quantitative accessibility gap between urban and rural areas and underscored the necessity of social infrastructures planning to address such disparities. 展开更多
关键词 accessIBILITY Social infrastructures Urban-rural difference INEQUALITY Regional sustainability
下载PDF
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
7
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model Internet access rural China
下载PDF
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
8
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
下载PDF
Access数据库技术及其应用研究 被引量:1
9
作者 侯培杰 《信息与电脑》 2024年第3期149-151,共3页
文章主要研究Access数据库技术及其应用,首先介绍Access数据库技术的理论基础,包括数据库结构、数据库安全性、数据库存储空间,然后探讨Access数据库技术的应用方法,包括数据存储和管理、报表生成和打印、数据库设计和开发等,最后对基于... 文章主要研究Access数据库技术及其应用,首先介绍Access数据库技术的理论基础,包括数据库结构、数据库安全性、数据库存储空间,然后探讨Access数据库技术的应用方法,包括数据存储和管理、报表生成和打印、数据库设计和开发等,最后对基于Access数据库的实例应用进行分析,展示Access数据库在提高工作效率、优化数据管理和增强决策能力等方面的作用。 展开更多
关键词 access 数据库技术 应用
下载PDF
基于BOPPPS模型和思维导图的Access数据库课程教学设计
10
作者 于惠雯 赵艺洁 《集成电路应用》 2024年第1期82-83,共2页
阐述BOPPPS模式和思维导图开展Access数据库课程教学设计,分析BOPPPS模型和思维导图的特点,探讨Access数据库课程教学设计中的应用,包括课堂引入、课程目标、参与式学习、考试评估。
关键词 思维导图 access数据库 课程设计 BOPPPS模型
下载PDF
Effectiveness of Ultrasound-Guided Arteriovenous Fistulas Cannulation in Difficult Hemodialysis Arteriovenous Access: A Meta-Analysis of Randomised Controlled Trials
11
作者 Alison Hiu Ming Chan Angie Ho Yan Lam 《Health》 2024年第11期994-1012,共19页
Aim(s): Complex Arteriovenous fistula (AVF) poses challenges to cannulation. Ultrasound (US)-guided cannulation may promote successful cannulation and prevent AVF-related complications. Renal nurses performing US-guid... Aim(s): Complex Arteriovenous fistula (AVF) poses challenges to cannulation. Ultrasound (US)-guided cannulation may promote successful cannulation and prevent AVF-related complications. Renal nurses performing US-guided cannulation may improve successful cannulation and reduce complications associated with unnecessary punctures. The study aims to conduct the meta-analyze to examine the effectiveness of renal nurse-performed US-guided cannulation to improve successful cannulation and reduce AVF-related complications in difficult AVF access. Design: A meta-analysis of randomised controlled trials. Methods: A systemic search was performed on electronic databases including CINAHL Plus, Web of Science, and PubMed from inception to October 2023. Risk ratios (RR) and standardized mean differences (SMD) were estimated using random-effect models for considerable homogeneity, and the Scottish Intercollegiate Guidelines Network (SIGN) methodology was adopted for critical appraisal. Results: Four RCTs were included. The results showed US-guided AVF cannulation had a significant effect in improving successful cannulation (RR: 0.19, 95% CI: 0.06 to 0.63, p = 0.007), and was favorable in reducing cannulation-associated complications (RR: 0.44, 95% CI: 0.10 to 1.93, p = 0.28), compared with blind needle cannulation. Conclusion: US-guided cannulation performed by renal nurses has the potential to improve successful cannulation, and fewer complications in hemodialysis patients with difficult arteriovenous access. Relevance to Clinical Practice: The results suggest the value of further training for renal nurses in US-guided cannulation, and broader implementation of US-guided cannulation to improve patient outcomes. Future studies could explore the optimal nursing training and longer-term benefits of US-guided cannulation by renal nurses in difficult AVF access. Patient or Public Contribution: No Patient or Public Contribution as this is a meta-analysis using the secondary data published in the RCTs. 展开更多
关键词 Arteriovenous Fistula CANNULATION Dialysis access HEMODIALYSIS Renal Nurse Ultrasound Guidance Vascular access
下载PDF
Access原发性肝癌数据库的建立及其应用价值分析
12
作者 王海永 孔春丽 +2 位作者 周利芬 洪怀江 王祖飞 《数字通信世界》 2024年第12期108-110,共3页
目的:探讨Access原发性肝癌数据库的建立方法及其应用价值。方法:选择本院2020年1月至2024年4月期间确诊的原发性肝癌患者,数据来源为医院内局域网系统中的患者信息数据,通过Access数据库保存和管理患者的临床资料,建立原发性肝癌患者... 目的:探讨Access原发性肝癌数据库的建立方法及其应用价值。方法:选择本院2020年1月至2024年4月期间确诊的原发性肝癌患者,数据来源为医院内局域网系统中的患者信息数据,通过Access数据库保存和管理患者的临床资料,建立原发性肝癌患者的临床资料专科数据库。结果本院成功创建了原发性肝癌数据库并应用于临床诊疗、教学和科研等工作中。结论:建立原发性肝癌数据库并形成肝癌临床数据库管理系统,从而为临床诊疗工作和科研工作提供有效数据支撑,应用价值较高。 展开更多
关键词 原发性肝癌 access数据库 k均值聚类算法机器 SMITH-WATERMAN算法 应用价值
下载PDF
Power-Domain Collision-Tolerant Random Access Method with Auxiliary Beam for Satellite Internet of Things:A New Solution
13
作者 Xu Yuanyuan Liu Ziwei +1 位作者 Bian Dongming Zhang Gengxin 《China Communications》 SCIE CSCD 2024年第8期236-248,共13页
There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The re... There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The regular random access(RA)protocols may generate large amounts of collisions,which degrade the system throughout severally.The near-far effect and power control technologies are not applicable in capture effect to obtain power difference,resulting in the collisions that cannot be separated.In fact,the optimal design at the receiving end can also realize the condition of packet power domain separation,but there are few relevant researches.In this paper,an auxiliary beamforming scheme is proposed for power domain signal separation.It adds an auxiliary reception beam based on the conventional beam,utilizing the correlation of packets in time-frequency domain between the main and auxiliary beam to complete signal separation.The roll-off belt of auxiliary beam is used to create the carrier-to-noise ratio(CNR)difference.This paper uses the genetic algorithm to optimize the auxiliary beam direction.Simulation results show that the proposed scheme outperforms slotted ALOHA(SA)in terms of system throughput per-formance and without bringing terminals additional control burden. 展开更多
关键词 beamforming non-orthogonal multiple access random access satellite Internet of Things
下载PDF
The Extended Hybrid Carrier-Based Multiple Access Technology for High Mobility Scenarios 被引量:1
14
作者 Ge Song Xiaojie Fang Xuejun Sha 《China Communications》 SCIE CSCD 2024年第1期53-68,共16页
The hybrid carrier(HC)system rooted in the carrier fusion concept is gradually garnering attention.In this paper,we study the extended hybrid carrier(EHC)multiple access scheme to ensure reliable wireless communicatio... The hybrid carrier(HC)system rooted in the carrier fusion concept is gradually garnering attention.In this paper,we study the extended hybrid carrier(EHC)multiple access scheme to ensure reliable wireless communication.By employing the EHC modulation,a power layered multiplexing framework is realized,which exhibits enhanced interference suppression capability owing to the more uniform energy distribution design.The implementation method and advantage mechanism are explicated respectively for the uplink and downlink,and the performance analysis under varying channel conditions is provided.In addition,considering the connectivity demand,we explore the non-orthogonal multiple access(NOMA)method of the EHC system and develop the EHC sparse code multiple access scheme.The proposed scheme melds the energy spread superiority of EHC with the access capacity of NOMA,facilitating superior support for massive connectivity in high mobility environments.Simulation results have verified the feasibility and advantages of the proposed scheme.Compared with existing HC multiple access schemes,the proposed scheme exhibits robust bit error rate performance and can better guarantee multiple access performance in complex scenarios of nextgeneration communications. 展开更多
关键词 extended hybrid carrier system high mo-Received:Jun.09 2023 Revised:Nov.20 2023 Editor:Yuanwei Liu bility communications multiple access
下载PDF
Which Neighborhoods Have Easier Access to Online Home Delivery Services?A Spatiotemporal Accessibility Analysis in Nanjing,China
15
作者 KONG Yu ZHEN Feng +1 位作者 ZHANG Shanqi SHEN Lizhen 《Chinese Geographical Science》 SCIE CSCD 2024年第4期722-738,共17页
The rise in online home delivery services(OHDS)has had a significant impact on how urban services are supplied and used in recent years.Studies on the spatial accessibility of OHDS are emerging,but few is known about ... The rise in online home delivery services(OHDS)has had a significant impact on how urban services are supplied and used in recent years.Studies on the spatial accessibility of OHDS are emerging,but few is known about the temporal dimension of OHDS accessibility as well as the geographic and socioeconomic differences in the spatiotemporal accessibility of OHDS.This study measures the spatiotemporal accessibility of four types of OHDS,namely leisure,fresh and convenient,medical,and catering services.The geographic and socioeconomic disparities in the spatiotemporal accessibility of these four types of OHDS are then identified using spatial statistical methods and the Kruskal-Wallis test(K-W test).The case study in Nanjing,China,suggests that:1)spatiotemporal accessibility better reflects the temporal variation of OHDS accessibility and avoids overestimation of OHDS accessibility when only considering its spatial dimension.2)The spatiotemporal accessibility of OHDS varies geographically and socioeconomically.Neighborhoods located in the main city or neighborhoods with higher housing prices,higher population density,and higher point of interest(POI)mix have better OHDS spatiotemporal accessibility.Our study contributes to the understanding of OHDS accessibility from a spatiotemporal perspective,and the empirical insights can assist policymakers in creating intervention plans that take into account variations in OHDS spatiotemporal accessibility. 展开更多
关键词 online home delivery services(OHDS) spatiotemporal accessibility neighborhoods accessibility differences Nanjing City China
下载PDF
6G New Multiple Access Technology
16
作者 Yifei Yuan Yongpeng Wu +3 位作者 Lei Wang Zhifeng Yuan Wei Bai Yuanwei Liu 《China Communications》 SCIE CSCD 2024年第1期I0002-I0005,共4页
As a basic technology at physical layer of mobile communications,non-orthogonal multiple access has been attracting wide attention across the academia and the industry.During the standardization of the fifth-generatio... As a basic technology at physical layer of mobile communications,non-orthogonal multiple access has been attracting wide attention across the academia and the industry.During the standardization of the fifth-generation(5G)of mobile communications,3GPP conducted preliminary study on non-orthogonal multiple access without reaching the consensus to standardize the technology. 展开更多
关键词 TECHNOLOGY access attracting
下载PDF
浅谈“点点通”卫星广播接收设备的维护
17
作者 乔晓斌 《影视技术》 2003年第4期51-51,共1页
关键词 武警部队 卫星广播电视 点点通工程 接收设备 天线 维护 接收机 工作环境
下载PDF
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
18
作者 Aljuaid Turkea Ayedh M Ainuddin Wahid Abdul Wahab Mohd Yamani Idna Idris 《Computers, Materials & Continua》 SCIE EI 2024年第9期4663-4686,共24页
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy... Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management. 展开更多
关键词 BYOD security access control access control decision-enforcement deep learning neural network techniques TabularDNN MULTILAYER dynamic adaptable FLEXIBILITY bottlenecks performance policy conflict
下载PDF
OFDMA-Based Unsourced Random Access in LEO Satellite Internet of Things
19
作者 Jiaqi Fang Gangle Sun +2 位作者 Wenjin Wang Li You Rui Ding 《China Communications》 SCIE CSCD 2024年第1期13-23,共11页
This paper investigates the low earth orbit(LEO)satellite-enabled coded compressed sensing(CCS)unsourced random access(URA)in orthogonal frequency division multiple access(OFDMA)framework,where a massive uniform plana... This paper investigates the low earth orbit(LEO)satellite-enabled coded compressed sensing(CCS)unsourced random access(URA)in orthogonal frequency division multiple access(OFDMA)framework,where a massive uniform planar array(UPA)is equipped on the satellite.In LEO satellite communications,unavoidable timing and frequency offsets cause phase shifts in the transmitted signals,substantially diminishing the decoding performance of current terrestrial CCS URA receiver.To cope with this issue,we expand the inner codebook with predefined timing and frequency offsets and formulate the inner decoding as a tractable compressed sensing(CS)problem.Additionally,we leverage the inherent sparsity of the UPA-equipped LEO satellite angular domain channels,thereby enabling the outer decoder to support more active devices.Furthermore,the outputs of the outer decoder are used to reduce the search space of the inner decoder,which cuts down the computational complexity and accelerates the convergence of the inner decoding.Simulation results verify the effectiveness of the proposed scheme. 展开更多
关键词 LEO OFDMA SATELLITE unsourced random access UPA
下载PDF
Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System
20
作者 Youngho Park Su Jin Shin Sang Uk Shin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期671-688,共18页
Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly... Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies. 展开更多
关键词 Bilateral access control blockchain data sharing policy-match
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部