Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (4): 1047-1050.DOI: 10.11772/j.issn.1001-9081.2014.04.1047
Previous Articles Next Articles
Received:
2013-10-22
Revised:
2013-12-10
Online:
2014-04-29
Published:
2014-04-01
Contact:
HUANG Dan
黄丹
通讯作者:
黄丹
作者简介:
基金资助:
国家自然科学基金资助项目
CLC Number:
HUANG Dan. Attribute-based encryption scheme combined with trust management in wireless sensor network[J]. Journal of Computer Applications, 2014, 34(4): 1047-1050.
黄丹. 无线传感器网络中结合信任管理的基于属性基加密方案[J]. 计算机应用, 2014, 34(4): 1047-1050.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2014.04.1047
[1]MANOLAKOS E S, LOGARAS E, PASCHOS F. Wireless sensor network application for fire hazard detection and monitoring [C]// SENSAPPEAL 2009: Proceedings of the 2009 International Conference on Sensor Applications, Experimentation, and Logistics. Berlin: Springer-Verlag, 2010: 1-15. |
[1] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[2] | Hang XU, Zhi YANG, Xingyuan CHEN, Bing HAN, Xuehui DU. Coverage-guided fuzzing based on adaptive sensitive region mutation [J]. Journal of Computer Applications, 2024, 44(8): 2528-2535. |
[3] | . Summary of network intrusion detection systems based on deep learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI. Multi-object cache side-channel attack detection model based on machine learning [J]. Journal of Computer Applications, 2024, 44(6): 1862-1871. |
[5] | . Location privacy-preserving recommendation scheme based on federated graph neural network [J]. Journal of Computer Applications, 0, (): 0-0. |
[6] | XiangJun LI, Junhong WANG, Shilu WANG, Jinxia CHEN, Jitao SUN, Jianhui WANG. Malicious traffic detection method based on multi-model parallel fusion network [J]. Journal of Computer Applications, 2023, 43(S2): 122-129. |
[7] | Jingcheng XU, Xuebin CHEN, Yanling DONG, Jia YANG. DDoS attack detection by random forest fused with feature selection [J]. Journal of Computer Applications, 2023, 43(11): 3497-3503. |
[8] | Shanshan HUO, Yanjun LI, Jian LIU, Yinshuang LI. Design and implementation of cipher component security criteria testing tool [J]. Journal of Computer Applications, 2023, 43(10): 3156-3161. |
[9] | Xiang GUO, Wengang JIANG, Yuhang WANG. Encrypted traffic classification method based on improved Inception-ResNet [J]. Journal of Computer Applications, 2023, 43(8): 2471-2476. |
[10] | Kui JIANG, Zhihang YU, Xiaolei CHEN, Yuhao LI. Design and implementation of Webshell traffic detection system based on BERT-CNN [J]. Journal of Computer Applications, 2023, 43(S1): 126-132. |
[11] | Chao ZHENG, Yueting WU, Ke XIAO. Intrusion detection based on federated learning and deep residual network [J]. Journal of Computer Applications, 2023, 43(S1): 133-138. |
[12] | Yiting SUN, Yue GUO, Changjin LI, Hongjun ZHANG, Kang LIU, Junjiao Liu, Limin SUN. Intrusion detection method for control logic injection attack against programmable logic controller [J]. Journal of Computer Applications, 2023, 43(6): 1861-1869. |
[13] | Haiyan HU, Qiaoyan KANG, Shuo ZHAO, Jianfeng WANG, Youbin FU. Service function chain deployment optimization method based on node comprehensive importance ranking [J]. Journal of Computer Applications, 2023, 43(3): 860-868. |
[14] | Jingyun CHENG, Buhong WANG, Peng LUO. Static code defect detection method based on deep semantic fusion [J]. Journal of Computer Applications, 2022, 42(10): 3170-3176. |
[15] | Wenting BI, Haitao LIN, Liqun ZHANG. Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model [J]. Journal of Computer Applications, 2022, 42(9): 2780-2787. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||