×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [4]
北京大学 [3]
内容类型
期刊论文 [6]
其他 [1]
发表日期
2015 [7]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共7条,第1-7条
帮助
限定条件
发表日期:2015
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security
其他
2015-01-01
Su, Shenghui
;
Lu, Shuwang
;
Xu, Maozhi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Public key cryptoscheme
Semantical security
Bit-pair shadow
Random padding
Anomalous subset sum problem
Compact sequence
ENCRYPTION STANDARD
CRYPTOSYSTEM
SIGNATURES
KNAPSACKS
TRAPDOOR
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
期刊论文
INFORMATION SCIENCES, 2015
Wang, Ding
;
Wang, Nan
;
Wang, Ping
;
Qing, Sihan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
User anonymity
De-synchronization
Random oracle model
WIRELESS SENSOR NETWORKS
KEY AGREEMENT PROTOCOL
SMART-CARDS
PASSWORD AUTHENTICATION
MUTUAL AUTHENTICATION
MOBILE NETWORKS
ROBUST
EXCHANGE
ENHANCEMENT
CRYPTANALYSIS
Provably secure RSA-based remote user authentication protocol using passwords
期刊论文
xitong gongcheng lilun yu shijiansystem engineering theory and practice, 2015
Wang, Ding
;
Wang, Ping
;
Li, Zeng-Peng
;
Ma, Chun-Guang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/13
An efficient protocol for two-party explicit authenticated key agreement
期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 卷号: 27, 期号: 12
作者:
Zheng, Minghui
;
Zhou, Huihua
;
Chen, Jing
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/05
information security
key agreement
explicit authentication
provable security
A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 卷号: 74, 期号: 16
作者:
Tu, Hang
;
Kumar, Neeraj
;
Kim, Jongsung
;
Seo, Jungtaek
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/05
Certificateless cryptography
Authenticated key agreement
Provable security
Bilinear pairings
Elliptic curve
Efficient provably secure password-based explicit authenticated key agreement
期刊论文
PERVASIVE AND MOBILE COMPUTING, 2015, 卷号: 24
作者:
Ruan, Ou
;
Kumar, Neeraj
;
He, Debiao
;
Lee, Jong-Hyouk
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
Key agreement
Explicit authenticated key agreement
Password-based authentication
Provable security
Impersonation attack
Strongly secure certificateless one-pass authenticated key agreement scheme
期刊论文
KUWAIT JOURNAL OF SCIENCE, 2015, 卷号: 42, 期号: 1
作者:
Huang, Baojun
;
Tu, Hang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Authenticated key agreement
certificateless cryptography
eCK model
one-pass
provable security
©版权所有 ©2017 CSpace - Powered by
CSpace