Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (4): 1047-1050.DOI: 10.11772/j.issn.1001-9081.2014.04.1047
Previous Articles Next Articles
Received:
2013-10-22
Revised:
2013-12-10
Online:
2014-04-01
Published:
2014-04-29
Contact:
HUANG Dan
通讯作者:
黄丹
作者简介:
基金资助:
国家自然科学基金资助项目
CLC Number:
HUANG Dan. Attribute-based encryption scheme combined with trust management in wireless sensor network[J]. Journal of Computer Applications, 2014, 34(4): 1047-1050.
黄丹. 无线传感器网络中结合信任管理的基于属性基加密方案[J]. 计算机应用, 2014, 34(4): 1047-1050.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.04.1047
[1]MANOLAKOS E S, LOGARAS E, PASCHOS F. Wireless sensor network application for fire hazard detection and monitoring [C]// SENSAPPEAL 2009: Proceedings of the 2009 International Conference on Sensor Applications, Experimentation, and Logistics. Berlin: Springer-Verlag, 2010: 1-15. |
[1] | . Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | ZHU Yuna, ZHANG Yutao, YAN Shaoge, FAN Yudan, CHEN Hantuo. Protocol identification approach based on semi-supervised subspace clustering [J]. Journal of Computer Applications, 2021, 41(10): 2900-2904. |
[3] | XIAO Yuelei, DENG Xiaofan. Improvement and analysis of certificate-based wired local area network security association scheme [J]. Journal of Computer Applications, 2021, 41(7): 1970-1976. |
[4] | DU Xinyu, WANG Huaqun. Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks [J]. Journal of Computer Applications, 2021, 41(6): 1715-1722. |
[5] | WANG Yao, SUN Guozi. Oversampling method for intrusion detection based on clustering and instance hardness [J]. Journal of Computer Applications, 2021, 41(6): 1709-1714. |
[6] | GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan. Reverse hybrid access control scheme based on object attribute matching in cloud computing environment [J]. Journal of Computer Applications, 2021, 41(6): 1604-1610. |
[7] | . Adversarial attack algorithm for deep learning interpretability [J]. Journal of Computer Applications, 0, (): 0-0. |
[8] | GUO Shuai, SU Yang. Encrypted traffic classification method based on data stream [J]. Journal of Computer Applications, 2021, 41(5): 1386-1391. |
[9] | ZHANG Quanlong, WANG Huaibin. Intrusion detection model based on combination of dilated convolution and gated recurrent unit [J]. Journal of Computer Applications, 2021, 41(5): 1372-1377. |
[10] | TANG Yanqiang, LI Chenghai, SONG Yafei. Network security situation prediction based on improved particle swarm optimization and extreme learning machine [J]. Journal of Computer Applications, 2021, 41(3): 768-773. |
[11] | HANG Mengxin, CHEN Wei, ZHANG Renjie. Abnormal flow detection based on improved one-dimensional convolutional neural network [J]. Journal of Computer Applications, 2021, 41(2): 433-440. |
[12] | OU Binli, ZHONG Xiaru, DAI Jianhua, YANG Tian. Intrusion detection method based on variable precision covering rough set [J]. Journal of Computer Applications, 2020, 40(12): 3465-3470. |
[13] | YANG Jianxi, ZHANG Yuanli, JIANG Hua, ZHU Xiaochen. Detection method of physical-layer impersonation attack based on deep Q-network in edge computing [J]. Journal of Computer Applications, 2020, 40(11): 3229-3235. |
[14] | CHEN Yi, ZHANG Meijing, XU Fajian. Slow HTTP DoS attack detection method based on one-dimensional convolutional neural network [J]. Journal of Computer Applications, 2020, 40(10): 2973-2979. |
[15] | ZHAO Guoxin, DING Ruofan, YOU Jianzhou, LYU Shichao, PENG Feng, LI Fei, SUN Limin. Design and implementation of high-interaction programmable logic controller honeypot system based on industrial control business simulation [J]. Journal of Computer Applications, 2020, 40(9): 2650-2656. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||