Li C, Fang Y, Zhang X, Jin C, Shen Q, Wu Z.
A practical construction for large universe hierarchical attribute-based encryption. Concurr. Comput. Pract. Exp. [Internet]. 2017;29.
访问链接 Zhu Z, Shen Q, Yang Y, Wu Z.
MCS: Memory Constraint Strategy for Unified Memory Manager in Spark, in
23rd IEEE International Conference on Parallel and Distributed Systems, ICPADS 2017, Shenzhen, China, December 15-17, 2017. IEEE Computer Society; 2017:437–444.
访问链接 Qian W, Shen Q, Yang Y, Yang Y, Wu Z.
Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm, in
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings.Vol 10631. Springer; 2017:661–673.
访问链接 Feng X, Jin C, Li C, Fang Y, Shen Q, Wu Z.
Practical Large Universe Attribute-Set Based Encryption in the Standard Model, in
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings.Vol 10631. Springer; 2017:180–191.
访问链接 Xin W, Shen Q, Yang Y, Wu Z.
SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle, in
Digital Forensics and Cyber Crime - 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings.Vol 216. Springer; 2017:221–227.
访问链接