×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [11]
内容类型
期刊论文 [9]
其他 [2]
发表日期
2017 [2]
2016 [1]
2015 [1]
2014 [1]
2012 [1]
2010 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
限定条件
专题:北京大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
He, Debiao
;
Wang, Ding
;
Xie, Qi
;
Chen, Kefei
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
PRESERVING AUTHENTICATION
SENSOR NETWORKS
SCHEME
SECURE
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
Science China. Information Science, 2017
He Debiao
;
Wang Ding
;
Xie Qi
;
Chen Kefei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2017/12/03
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
Delegation of signing rights for emerging 5G networks
期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016
Ge, Yongyong
;
Li, Yannan
;
Liu, Zhusong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
5G
network security
digital signature
proxy signature
chameleon hash
PROXY SIGNATURE SCHEME
DESIGNATED VERIFIER SIGNATURE
RANDOM ORACLES
SECURE
HASH
FACTORIZATION
POWER
Efficient bit sifting scheme of post-processing in quantum key distribution
期刊论文
QUANTUM INFORMATION PROCESSING, 2015
Li, Qiong
;
Le, Dan
;
Wu, Xianyan
;
Niu, Xiamu
;
Guo, Hong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2017/12/03
Quantum cryptography
Quantum key distribution
Post-processing
Bit sifting
Source coding
Unconditionally secure authentication
Net secure key rate
HASH FUNCTIONS
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
期刊论文
computer networks, 2014
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2015/11/10
Two-factor authentication
Wireless sensor networks
User anonymity
Smart card
Non-tamper resistant
REMOTE USER AUTHENTICATION
KEY AGREEMENT SCHEME
SMART CARDS
MUTUAL AUTHENTICATION
SECURITY ENHANCEMENT
ROAMING SERVICES
HASH FUNCTIONS
MESH NETWORKS
EFFICIENT
PROTOCOL
SECURE COLLABORATIVE INTEGRITY VERIFICATION FOR HYBRID CLOUD ENVIRONMENTS
期刊论文
2012
Zhu, Yan
;
Wang, Shanbiao
;
Hu, Hongxin
;
Ahn, Gail-Joon
;
Ma, Di
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/13
Integrity verification
multi-prover
collaborative
hybrid clouds
RETRIEVABILITY
PROOFS
Identity-based encryption based on DHIES
其他
2010-01-01
Chen, Yu
;
Charlemagne, Manuel
;
Guan, Zhi
;
Hu, Jianbin
;
Chen, Zhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2015/11/13
A secure routing protocol and its application in multi-sink wireless sensor networks
期刊论文
journal of networks, 2010
Gui, Nike
;
Hu, Jianbin
;
Chen, Zhong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2015/11/13
A Secure Routing and Aggregation Protocol with Low Energy Cost for Sensor Networks
其他
2009-01-01
Gui, Nike
;
Chen, Ruichuan
;
Cai, Zhuhua
;
Hu, Jianbin
;
Chen, Zhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/10
Wireless sensor networks
Security
Low energy cost
A Secure Routing and Aggregation Protocol for Sensor Networks
期刊论文
china communications, 2009
Gui Nike
;
Miao Yi
;
Hu Jianbin
;
Chen Zhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/13
wireless sensor networks
security
routing protocol
©版权所有 ©2017 CSpace - Powered by
CSpace