期刊文献+
共找到21,455篇文章
< 1 2 250 >
每页显示 20 50 100
Dataset Copyright Auditing for Large Models:Fundamentals,Open Problems,and Future Directions
1
作者 DU Linkang SU Zhou YU Xinyi 《ZTE Communications》 2025年第3期38-47,共10页
The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These con... The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These concerns have spurred a growing demand for dataset copyright auditing techniques,which aim to detect and verify potential infringements in the training data of commercial AI systems.This paper presents a survey of existing auditing solutions,categorizing them across key dimensions:data modality,model training stage,data overlap scenarios,and model access levels.We highlight major trends,including the prevalence of black-box auditing methods and the emphasis on fine-tuning rather than pre-training.Through an in-depth analysis of 12 representative works,we extract four key observations that reveal the limitations of current methods.Furthermore,we identify three open challenges and propose future directions for robust,multimodal,and scalable auditing solutions.Our findings underscore the urgent need to establish standardized benchmarks and develop auditing frameworks that are resilient to low watermark densities and applicable in diverse deployment settings. 展开更多
关键词 dataset copyright auditing large language models diffusion models multimodal auditing membership inference
在线阅读 下载PDF
An Efficient and Secure Data Audit Scheme for Cloud-Based EHRs with Recoverable and Batch Auditing
2
作者 Yuanhang Zhang Xu An Wang +3 位作者 Weiwei Jiang Mingyu Zhou Xiaoxuan Xu Hao Liu 《Computers, Materials & Continua》 2025年第4期1533-1553,共21页
Cloud storage,a core component of cloud computing,plays a vital role in the storage and management of data.Electronic Health Records(EHRs),which document users’health information,are typically stored on cloud servers... Cloud storage,a core component of cloud computing,plays a vital role in the storage and management of data.Electronic Health Records(EHRs),which document users’health information,are typically stored on cloud servers.However,users’sensitive data would then become unregulated.In the event of data loss,cloud storage providers might conceal the fact that data has been compromised to protect their reputation and mitigate losses.Ensuring the integrity of data stored in the cloud remains a pressing issue that urgently needs to be addressed.In this paper,we propose a data auditing scheme for cloud-based EHRs that incorporates recoverability and batch auditing,alongside a thorough security and performance evaluation.Our scheme builds upon the indistinguishability-based privacy-preserving auditing approach proposed by Zhou et al.We identify that this scheme is insecure and vulnerable to forgery attacks on data storage proofs.To address these vulnerabilities,we enhanced the auditing process using masking techniques and designed new algorithms to strengthen security.We also provide formal proof of the security of the signature algorithm and the auditing scheme.Furthermore,our results show that our scheme effectively protects user privacy and is resilient against malicious attacks.Experimental results indicate that our scheme is not only secure and efficient but also supports batch auditing of cloud data.Specifically,when auditing 10,000 users,batch auditing reduces computational overhead by 101 s compared to normal auditing. 展开更多
关键词 SECURITY cloud computing cloud storage recoverable batch auditing
在线阅读 下载PDF
Cloud EMRs auditing with decentralized (t, n)-threshold ownership transfer
3
作者 Yamei Wang Weijing You +2 位作者 Yuexin Zhang Ayong Ye Li Xu 《Cybersecurity》 2025年第4期142-158,共17页
In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efciently... In certain cloud Electronic Medical Records (EMRs) applications, the data ownership may need to be transferred. In practice, not only the data but also the auditing ability should be transferred securely and efciently. However, we investigate and fnd that most of the existing data ownership transfer protocols only work well between two indi-viduals,and they become inefcient when dealing between two communities. The proposals for transferring tags between communities are problematic as well since, they require all members get involved or a fully trusted aggrega-torfacilitates ownership transfer, which are unrealistic in certain scenarios. To alleviate these problems, in this paper we develop a secure auditing protocol with decentralized (t, n)-threshold ownership transfer for cloud EMRs. This protocol is designed to operate efciently without requiring the mandatory participation of every user or the involve-mentof any trusted third-party. It is achieved by employing the threshold signature. Rigorous security analyses and comprehensive performance evaluations illustrate the security and practicality of our protocol. Specifcally, according to the evaluations and comparisons, the communication and computational consumption is independent of the fle size, i.e., it is constant in our protocol for both communities. 展开更多
关键词 Integrity auditing Ownership transfer Threshold signature Cloud EMRs
原文传递
Construction of a Research-Based Learning Curriculum System Integrating Science,Industry,and Education:Exploring Innovative Paths in Educational Practice
4
作者 Dongning Feng Xuejun Dai Hui Yin 《Journal of Contemporary Educational Research》 2025年第4期8-15,共8页
This paper delves into the challenges and opportunities in the current educational system and proposes an innovative talent cultivation model that integrates science,industry,and education.Through an analysis of issue... This paper delves into the challenges and opportunities in the current educational system and proposes an innovative talent cultivation model that integrates science,industry,and education.Through an analysis of issues such as problems with university construction mechanisms,inadequate alignment between schools and enterprises,the disconnection between theory and practice,and a lack of awareness of innovation and entrepreneurship education,this paper explores a model using geography-related majors in higher education as an example.It discusses talent cultivation strategies based on innovation,professionalism,and practical education.Additionally,this paper explores a new teaching practice model for research-based learning curriculum design,as well as the construction and implementation of the curriculum system. 展开更多
关键词 Educational system Challenges and opportunities Integration of science industry and education Cultivation of innovative talents research-based learning curriculum system
在线阅读 下载PDF
双语审计Auditing本科教学的三重目标 被引量:2
5
作者 李保伟 《海外英语》 2014年第17期9-10,共2页
文章设定了双语审计Auditing本科教学的三重目标:精确地洞察和理解英语国家"原汁原味"的审计理念和方法;通过两种语言的比较与切换,去不断发现和理解中外审计的异同,强化对基本审计知识与技能的学习,逐步形成审计学的价值判断... 文章设定了双语审计Auditing本科教学的三重目标:精确地洞察和理解英语国家"原汁原味"的审计理念和方法;通过两种语言的比较与切换,去不断发现和理解中外审计的异同,强化对基本审计知识与技能的学习,逐步形成审计学的价值判断;在国际环境下,以英语和汉语两种语言为媒介,通过审计行为、审计观念和审计技术的互相渗透、互相融合,培养学生的全球审计服务意识。 展开更多
关键词 双语审计 auditing 教学目标
在线阅读 下载PDF
Multi-indicator assessment of water environment in government environmental auditing 被引量:5
6
作者 HE Gui-zhen LU Yong-long +1 位作者 MA Hua WANG Xiao-long 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2007年第4期494-501,共8页
This study focused on a multi-indicator assessment methodology for governmental environmental auditing of water protection programs. The environmental status of Wuli Lake in China was assessed using the global indicat... This study focused on a multi-indicator assessment methodology for governmental environmental auditing of water protection programs. The environmental status of Wuli Lake in China was assessed using the global indicators (driver-status-response) developed by the Commission on Sustainable Development, and four additional indicators proposed by the author: water quality, pollution load, aquatic ecosystem status, and lake sediment deposition. Various hydrological, chemical, biological and environmental parameters were used to estimate the values of the indicators for assessment of environmental status of the lake based on time series data sets for twenty years. The indicators proposed can be customized to meeting the needs for particular assessment of water protection programs. This method can be used to evaluate the performance of national environmental protection programs and provide technical support for environmental auditors. 展开更多
关键词 environmental auditing environmental indicators pollution load lake ecosystem state assessment
在线阅读 下载PDF
ID-Based Public Auditing Protocol for Cloud Storage Data Integrity Checking with Strengthened Authentication and Security 被引量:1
7
作者 JIANG Hong XIE Mingming +2 位作者 KANG Baoyuan LI Chunqing SI Lin 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第4期362-368,共7页
Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a pu... Cloud storage service reduces the burden of data users by storing users' data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost. 展开更多
关键词 ID-based auditing data integrity checking digital signature SECURITY bilinear map
原文传递
Public Auditing for Encrypted Data with Client-Side Deduplication in Cloud Storage 被引量:4
8
作者 HE Kai HUANG Chuanhe +3 位作者 ZHOU Hao SHI Jiaoli WANG Xiaomao DAN Feng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第4期291-298,共8页
Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects... Storage auditing and client-side deduplication techniques have been proposed to assure data integrity and improve storage efficiency, respectively. Recently, a few schemes start to consider these two different aspects together. However, these schemes either only support plaintext data file or have been proved insecure. In this paper, we propose a public auditing scheme for cloud storage systems, in which deduplication of encrypted data and data integrity checking can be achieved within the same framework. The cloud server can correctly check the ownership for new owners and the auditor can correctly check the integrity of deduplicated data. Our scheme supports deduplication of encrypted data by using the method of proxy re-encryption and also achieves deduplication of data tags by aggregating the tags from different owners. The analysis and experiment results show that our scheme is provably secure and efficient. 展开更多
关键词 public auditing data integrity storage deduplication cloud storage
原文传递
Reforming the natural resource auditing system from the ecological civilization perspective 被引量:3
9
作者 Junsheng Lei 《Chinese Journal of Population,Resources and Environment》 2020年第2期87-96,共10页
Perfecting the natural resource system and auditing natural resource assets are requirements in protecting natural resources and developing an ecological civilization in practice.While the natural resource asset audit... Perfecting the natural resource system and auditing natural resource assets are requirements in protecting natural resources and developing an ecological civilization in practice.While the natural resource asset audit both confirms and quantifies natural resources,the nature of such resources makes it difficult to identify their ownership.Further,these resources'diversity creates complex measurement standards and activities,all of which require relevant institutional guarantees.However,the existing audit system for natural resource assets includes insufficient stock,incremental difficulties,and poor guidance,which cannot meet the requirements for environmental governance and an ecological civilization.Thus,it is necessary to define natural resource assets’rights and measurement systems and responsibility regulations,among others;construct an auditing participation system,technical regulations,and evaluation criterion for natural resource assets;amend the Audit Law in a timely manner;and enact natural resource asset legislation.Ultimately,such efforts would eliminate the bottleneck in the natural resource asset auditing system and facilitate the construction of a resource-saving,environmentally friendly society. 展开更多
关键词 Ecological civilization Natural resource auditing system REFORM
在线阅读 下载PDF
A survey on blockchain-based integrity auditing for cloud data 被引量:2
10
作者 Haoxiang Han Shufan Fei +1 位作者 Zheng Yan Xiaokang Zhou 《Digital Communications and Networks》 SCIE CSCD 2022年第5期591-603,共13页
With the rapid advancement of cloud computing,cloud storage services have developed rapidly.One issue that has attracted particular attention in such remote storage services is that cloud storage servers are not enoug... With the rapid advancement of cloud computing,cloud storage services have developed rapidly.One issue that has attracted particular attention in such remote storage services is that cloud storage servers are not enough to reliably save and maintain data,which greatly affects users’confidence in purchasing and consuming cloud storage services.Traditional data integrity auditing techniques for cloud data storage are centralized,which faces huge security risks due to single-point-of-failure and vulnerabilities of central auditing servers.Blockchain technology offers a new approach to this problem.Many researchers have endeavored to employ the blockchain for data integrity auditing.Based on the search of relevant papers,we found that existing literature lacks a thorough survey of blockchain-based integrity auditing for cloud data.In this paper,we make an in-depth survey on cloud data integrity auditing based on blockchain.Firstly,we cover essential basic knowledge of integrity auditing for cloud data and blockchain techniques.Then,we propose a series of requirements for evaluating existing Blockchain-based Data Integrity Auditing(BDIA)schemes.Furthermore,we provide a comprehensive review of existing BDIA schemes and evaluate them based on our proposed criteria.Finally,according to our completed review and analysis,we explore some open issues and suggest research directions worthy of further efforts in the future. 展开更多
关键词 Blockchain Cloud storage Integrity auditing DECENTRALIZATION
在线阅读 下载PDF
WiBPA:An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings 被引量:2
11
作者 Chunhua Li Peng Wang +2 位作者 Changhong Sun Ke Zhou Ping Huang 《Computers, Materials & Continua》 SCIE EI 2019年第2期319-333,共15页
The security of cloud data has always been a concern.Cloud server provider may maliciously tamper or delete user’s data for their own benefit,so data integrity audit is of great significance to verify whether data is... The security of cloud data has always been a concern.Cloud server provider may maliciously tamper or delete user’s data for their own benefit,so data integrity audit is of great significance to verify whether data is modified or not.Based on the general three-party audit architecture,a dynamic auditing scheme without bilinear pairings is proposed in this paper.It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence.By establishing the mapping relation between logic index and tag index of data block with index transformation table,our scheme can easily support dynamic data operation.By hiding random numbers in the integrity evidence,our scheme can protect users’privacy information.Detailed security analysis shows that our scheme is secure against attacks such as forgery,replaying and substitution.Further experiments demonstrate that our scheme has lower computational overhead. 展开更多
关键词 Cloud storage integrity verification dynamic auditing bilinear pairings
在线阅读 下载PDF
Authorized Identity-Based Public Cloud Storage Auditing Scheme with Hierarchical Structure for Large-Scale User Groups 被引量:3
12
作者 Yue Zhang Hanlin Zhang +1 位作者 Rong Hao Jia Yu 《China Communications》 SCIE CSCD 2018年第11期111-121,共11页
Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authentica... Identity-based public cloud storage auditing schemes can check the integrity of cloud data, and reduce the complicated certificate management. In such a scheme, one Private Key Generator(PKG) is employed to authenticate the identity and generate private keys for all users, and one Third Party Auditor(TPA) is employed to by users to check the integrity of cloud data. This approach is undesirable for large-scale users since the PKG and the TPA might not be able to afford the heavy workload. To solve the problem, we give a hierarchical Private Key Generator structure for large-scale user groups, in which a root PKG delegates lower-level PKGs to generate private keys and authenticate identities. Based on the proposed structure, we propose an authorized identity-based public cloud storage auditing scheme, in which the lowest-level PKGs play the role of TPA, and only the authorized lowest-level PKGs can represent users in their domains to check cloud data's integrity. Furthermore, we give the formal security analysis and experimental results, which show that our proposed scheme is secure and efficient. 展开更多
关键词 cloud storage cloud storage auditing large-scale users third party auditor
在线阅读 下载PDF
Energy Auditing and Improvement Scheme for Faculty of Applied Medical Sciences at Taibah University 被引量:1
13
作者 Khaled S. AlQdah Osama Alhazmi +2 位作者 Mustafa Mohammad Abdulelah Alzahrani Hussein Alaqeel 《Open Journal of Energy Efficiency》 2020年第1期64-80,共17页
In this work, a survey is used to investigate the current energy performance for Faculty of Applied Medical Sciences (previously Faculty of Engineering) at Taibah University in Medina city. The results of the survey s... In this work, a survey is used to investigate the current energy performance for Faculty of Applied Medical Sciences (previously Faculty of Engineering) at Taibah University in Medina city. The results of the survey show that several factors affect the energy performance in this building. It revealed that the building has been poorly designed from the point of view of thermal performance. Therefore, the building energy consumption needs to be monitored and maintained through energy auditing program. To determine the energy profile, the power consumption was calculated;the cooling load was estimated and analyzed to know the actual capacity required. The level of comfort in the building has been evaluated. Against the installed air conditioning capacity of 200-ton refrigeration, the cooling load calculations showed that the maximum cooling load needed, which is in August is only 83.22-ton refrigeration. In addition, illumination levels were measured and compared to the standard levels. Based on obtained results, two solutions were proposed: to install a building management system with approximate cost of 337,904 SR and to replace the existing chiller. Finally, the payback period for the proposed system has been estimated and found to be about 5.4 years. 展开更多
关键词 auditing Payback PERIOD COOLING Load Building Management System ILLUMINATION
在线阅读 下载PDF
Security Analysis on a Remote Data Auditing Scheme for Distributed Storage Systems 被引量:1
14
作者 LIU Guangjun ZHANG Lining LI Xiangjun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第6期527-530,共4页
Remote data auditing becomes critical to ensure the storage reliability in distributed cloud storage.Recently,Le et al proposed an efficient private data auditing scheme NC-Audit designed for regenerating codes,which ... Remote data auditing becomes critical to ensure the storage reliability in distributed cloud storage.Recently,Le et al proposed an efficient private data auditing scheme NC-Audit designed for regenerating codes,which claimed that NC-Audit can effectively realize privacy-preserving data auditing for distributed storage systems.However,our analysis shows that NC-Audit is not secure for that the adversarial cloud can forge some illegal blocks to cheat the auditor successfully with a high probability even without storing the user’s whole data,when the coding field is large enough. 展开更多
关键词 data auditing regeneration code network coding distributed storage cloud computing
原文传递
Research on Firm Size, Firm Performance and Internal Auditing Modes——Based on Listed Manufacturing Companies of China 被引量:1
15
作者 Xinsheng Cheng Yi Zhang 《Journal of Modern Accounting and Auditing》 2005年第2期59-68,共10页
This paper is based on the samples of listed manufacturing companies of China, taking the financial performance as criterion, and then does research on the firm performance with different internal auditing modes, usin... This paper is based on the samples of listed manufacturing companies of China, taking the financial performance as criterion, and then does research on the firm performance with different internal auditing modes, using Cross-sectional data to analyze the distribution of internal auditing modes and the characteristics of the firm performance. The conclusion is that setting up internal auditing is good for the development of companies, but the function of internal auditing has not been widelv fulfilled. 展开更多
关键词 manufacturing industry firm performance internal auditing auditing modes
在线阅读 下载PDF
State Auditing With the Investment in Public Sector: Case of Vietnam 被引量:1
16
作者 Mai Thi Hoang Minh 《Journal of Modern Accounting and Auditing》 2013年第10期1334-1341,共8页
In Vietnam, in the current period, public investment plays an important role in the improvement of technical infrastructure systems, economic and social development of motivation to promote national development. Howev... In Vietnam, in the current period, public investment plays an important role in the improvement of technical infrastructure systems, economic and social development of motivation to promote national development. However, the question is how to ensure that these sources of funds are used most effectively in terms of limited resources. In this article, the author would like to emphasize the critical role of the state auditor which is not only in the transparency of information, in enhancing the trust of the citizens, but also in providing important and reliable information to the public sector agencies, units, investors, and people in the society. From that, it could help to serve the management and administration of revenues and expenditures of the state budget as well as reasonably and efficiently using financial resources and assets. In case of perfectly conducting those tasks, they will contribute the power to the economy, fight corruption as loss or waste, and detect and prevent violations of law; improve the efficient use of the budget, the money, and property of the state; and serve effectively for the operation of the National Assembly and People's Councils at all levels of the implementation and monitoring function to decide important issues of national and local governments. With the above information, these matters in Vietnam will be solved through this paper that consists of five parts: (1) the basics about the current public investment in Vietnam; (2) the role of state auditing in improving performance management and monitoring of investment; (3) the limitations of state auditing in public investment; (4) many solutions to promote the role of state auditing in improving the effective investment activities; and (5) conclusion. 展开更多
关键词 BUDGET public sector state auditing STATE GOVERNMENT
在线阅读 下载PDF
Big Data, Data Analytics and External Auditing 被引量:1
17
作者 Dimitris Balios Panagiotis Kotsilaras +1 位作者 Nikolaos Eriotis Dimitrios Vasiliou 《Journal of Modern Accounting and Auditing》 2020年第5期211-219,共9页
Big Data and Data Analytics affect almost all aspects of modern organisations’decision-making and business strategies.Big Data and Data Analytics create opportunities,challenges,and implications for the external audi... Big Data and Data Analytics affect almost all aspects of modern organisations’decision-making and business strategies.Big Data and Data Analytics create opportunities,challenges,and implications for the external auditing procedure.The purpose of this article is to reveal essential aspects of the impact of Big Data and Data Analytics on external auditing.It seems that Big Data Analytics is a critical tool for organisations,as well as auditors,that contributes to the enhancement of the auditing process.Also,legislative implications must be taken under consideration,since existing standards may need to change.Last,auditors need to develop new skills and competence,and educational organisations need to change their educational programs in order to be able to correspond to new market needs. 展开更多
关键词 Big Data Data Analytics auditing ACCOUNTING
在线阅读 下载PDF
Social Work as a Research-Based Profession: Opportunities, Prerequisites and Restrictions 被引量:2
18
作者 Juha Hamalainen 《Sociology Study》 2011年第7期473-483,共11页
The concept of research-based social work is introduced and discussed from the point of view of preconditions for its realization. Attention is paid both to the academic research of social work and to opportunities fo... The concept of research-based social work is introduced and discussed from the point of view of preconditions for its realization. Attention is paid both to the academic research of social work and to opportunities for developing a knowledge-producing social work practice. Both of these are seen as essential elements of a research-based profession. On the one hand, the academic research is necessary for development of social work as a research-based professional system, and on the other hand, a knowledge-producing practice, conducted by research-oriented practitioners, can only be realized within such a system. Historically, social work has been partly developed as a knowledge-applying instead of a knowledge-producing profession, although the central founding pioneers emphasized the importance of an own-knowledge basis and theory formation, as well as the idea of knowledge-producing practice based on a corresponding professional identity. The future of social work as a professional system in modern society may depend decisively on how it develops a research-based professional identity, not only in the sense of academic research but also through practitioners with research orientation. These are practitioners who would be capable of research-based working in terms of creative knowledge production, thus of developing social work as a credible research-based profession. This can be created only through education in which the development of necessary professional skills is linked to advanced academic meta-skills. There are good reasons to suspect that a three-year education is too short for this. 展开更多
关键词 Social work profession research-based social work education of social work social work practice
在线阅读 下载PDF
Verifiable Auditing Protocol with Proxy Re-Encryption for Outsourced Databases in Cloud
19
作者 GAO Ziyuan WANG Baocang +2 位作者 LIU Hequn LU Ke ZHAN Yu 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2018年第2期120-128,共9页
As a new computing paradigm, outsourcing computing provides inexpensive, on-demand, convenient storage and computing services for cloud clients. For the security of outsourcing databases to the cloud, it is important ... As a new computing paradigm, outsourcing computing provides inexpensive, on-demand, convenient storage and computing services for cloud clients. For the security of outsourcing databases to the cloud, it is important to allow the user to verify the query results returned by the cloud server. So far, tremendous efforts have been carried out to study secure outsourcing computing. The existing scheme supports that the user can detect the correctness and completeness of the query results even if the cloud server returns an empty set. However, since the data owner performs the database encryption operations and uploads the encrypted database to the cloud server, they require the user to request the data owner to decrypt the query results. In this paper, we propose a new scheme, which can accurately verify the search results. Meanwhile, the users can decrypt the query results independently. Furthermore, the proposed scheme supports a large number of data owners to upload their encrypted database to the cloud server, and it can efficiently verify the query results. Besides, we can prove that our proposed solution can achieve the desired security properties. 展开更多
关键词 outsourcing computing verifiable auditing proxyre-encryption bilinear aggregate signature
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部