×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [28]
华南理工大学 [23]
兰州理工大学 [6]
山东大学 [4]
北京航空航天大学 [3]
上海电子信息职业技术... [3]
更多...
内容类型
会议论文 [73]
发表日期
2020 [2]
2019 [1]
2018 [1]
2015 [1]
2013 [1]
2012 [7]
更多...
学科主题
Mathematic... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共73条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Authentication Technology in Industrial Control System Based on Identity Password
会议论文
Shenyang, China, July 27-29, 2020
作者:
Yang LY(杨路瑶)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Wang TY(王天宇)
;
Liu ZB(刘周斌)
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/10/10
Industrial control security
digital signature
identity authentication
SSL/TLS handshake protocol
One-Stop Efficient PKI Authentication Service Model Based on Blockchain
会议论文
Chengdu, China, October 11, 2019 - October 13, 2019
作者:
Feng, Tao
;
Chen, Wuyang
;
Zhang, Di
;
Liu, Chunyan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Blockchain
Public key cryptography
Authentication services
Batch update
Dynamic accumulators
Identity authentication
Public key infrastructure technologies
Storage overhead
Third-party service providers
User authentication
A Privacy-Aware PKI System Based on Permissioned Blockchains
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:
Wang, R.
;
He, J.
;
Liu, C.
;
Li, Q.
;
Tsai, W.-T.
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/30
Blockchain
Distributed computer systems
Efficiency
Public key cryptography
Software engineering
component
Digital certificates
permissioned blockchains
Privacy awareness
Public key infrastructure
security
Network security
A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF (p)
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Liu, J.
;
Guan, Z.
;
Cheng, D.
;
Wang, Z.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Computation theory
Distributed computer systems
Geometry
Integer programming
Integrated circuit design
Multipurpose robots
Public key cryptography
Robotics
VLSI circuits
Elliptic curve cryptography
Elliptic Curve Cryptography (ECC)
Modular inversion algorithms
Modular Multiplication
Montgomery multiplication
Parallel scheduling
Point multipliers
Scalar point multiplication
Speed
Efficient Modular Reduction Algorithm Without Correction Phase
会议论文
9th International Frontiers of Algorithmics Workshop (FAW), Guilin, PEOPLES R CHINA, 2015-01-01
作者:
Yu, Haibo
;
Bai, Guoqiang
;
Hao, Huikang
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/01/06
Public-key cryptography
Modular reduction
Barrett algorithm
Correction phase
High-speed hardware implementation
Towards a Secure Certificateless Proxy Re-Encryption Scheme
会议论文
7th International Conference on Provable Security (ProvSec), Melaka, MALAYSIA, OCT 23-25, 2013
Guo, Hui
;
Zhang, Zhenfeng
;
Zhang, Jiang
;
Chen, Cheng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2014/12/16
deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting
会议论文
8th International Conference on Security and Cryptography for Networks, SCN 2012, Amalfi, Italy, September 5, 2012 - September 7, 2012
Xie Xiang
;
Xue Rui
;
Zhang Rui
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2013/09/22
Crystal lattices
Quantum theory
Security of data
combined public-key schemes: the case of abe and abs
会议论文
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2013/09/22
Concrete construction
on enumeration of polynomial equivalence classes
会议论文
SCIENCE CHINA Mathematics
Wang TianZe
;
Lin DongDai
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2013/09/22
enumerative problem –
isomorphism of polynomials –
finite geometry
a generic construction from selective-ibe to public-key encryption with non-interactive opening
会议论文
7th China International Conference on Information Security and Cryptography, Inscrypt 2011, Beijing, China, November 30, 2011 - December 3, 2011
Zhang Jiang
;
Xie Xiang
;
Zhang Rui
;
Zhang Zhenfeng
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2013/09/22
Security of data
©版权所有 ©2017 CSpace - Powered by
CSpace