×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [10]
内容类型
期刊论文 [6]
会议论文 [4]
发表日期
2020 [1]
2019 [1]
2016 [1]
2015 [1]
2012 [3]
2011 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
One-Stop Efficient PKI Authentication Service Model Based on Blockchain
会议论文
Chengdu, China, October 11, 2019 - October 13, 2019
作者:
Feng, Tao
;
Chen, Wuyang
;
Zhang, Di
;
Liu, Chunyan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Blockchain
Public key cryptography
Authentication services
Batch update
Dynamic accumulators
Identity authentication
Public key infrastructure technologies
Storage overhead
Third-party service providers
User authentication
Research on secure routing technology based on NDN for VANET
会议论文
Hong Kong, Hong kong, June 1, 2019 - June 3, 2019
作者:
Gai, Xiaowei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/15
Cryptography
Distributed computer systems
Dynamics
Floods
Memory architecture
Mobile security
Mobile telecommunication systems
Network architecture
Network routing
Signal processing
Transmission control protocol
Vehicular ad hoc networks
Data network
Forward-secure
Identity based cryptography
Named data networkings
Network environments
Security requirements
Trust values
Wireless mobile networks
Security analysis of speech perceptual hashing authentication algorithm
期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: 1, 页码: 103-118
作者:
Zhang, Qiu-Yu
;
Ren, Zhan-Wei
;
Xing, Peng-Fei
;
Huang, Yi-Bo
;
Shuang, Yu
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/11/14
Authentication
Cryptography
Security systems
Authentication algorithm
Content integrity
Encrypted algorithms
Identity authentication
Perceptual hashing
Secret key
Security analysis
Unicity distances
Data packets bidirectional anonymous identity privacy protection scheme for named data networking
期刊论文
Journal of Computational Information Systems, 2015, 卷号: 11, 期号: 11, 页码: 3987-3998
作者:
Feng, Tao
;
Zhou, Tao
;
Guo, Xian
;
Liu, Chunyan
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/11/14
Cryptography
Internet service providers
Bidirectional anonymity
Content packets
Multiple receivers
Named data networkings
Privacy information
Secure access authentication scheme for 4G wireless network based on PCL
期刊论文
Tongxin Xuebao/Journal on Communications, 2012, 卷号: 33, 期号: 4, 页码: 77-84
作者:
Wang, Li-Li
;
Feng, Tao
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
4G mobile communication systems
Authentication
Computer circuits
Computer terminals
Cryptography
Mobile telecommunication systems
Network security
Wireless networks
4G wireless networks
Access authentications
Authentication protocols
Comprehensive analysis
Protocol composition logic
Protocol derivation systems
Security attributes
Selfcertified public key
WAPI secure access authentication scheme for heterogeneous networks based on identity-based cryptograph
会议论文
Seoul, Korea, Republic of, April 24, 2012 - April 26, 2012
作者:
Feng, Tao
;
Jiao, Jian
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Authentication
Computation theory
Computer circuits
Cryptography
Heterogeneous networks
Information management
Mobile security
Wireless local area networks (WLAN)
Access authentications
Authentication protocols
Comprehensive analysis
Identity based cryptographs
Man in the middle attacks
Mutual authentication
Protocol composition logic
WAPI
UC secure network coding against pollution attacks
期刊论文
Information Technology Journal, 2012, 卷号: 11, 期号: 9, 页码: 1175-1183
作者:
Feng, Tao
;
Wang, Shuang
;
Yuan, Zhan-Ting
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2020/11/14
Authentication
Codes (symbols)
Cryptography
Network coding
Pollution
Comprehensive analysis
Information transmission
Pollution attack
Random network coding
Secure Network Coding
Signature Scheme
UC security
Universally composable
Provably secure anonymous authentication key agreement protocol for multicast group
期刊论文
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 卷号: 40, 期号: 2, 页码: 273-277
作者:
Feng, Tao
;
Liu, Yuan-Yuan
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Authentication
Group technology
Network protocols
Public key cryptography
Anonymity
Anonymous authentication
Anonymous groups
Computation complexity
Forward security
Key agreement
Multicast groups
Provably secure
Secure authenticated key agreement protocol for WMEN based on protocol composition logic
会议论文
作者:
Feng, Tao
;
Yi, Yangfan
;
Ma, Jianfeng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/11/15
Authentication
Computer crime
Public key cryptography
Authentication key agreement protocols
Forward-secure
Protocol composition logic
Protocol derivation systems
WMEN
Identity-base group key management scheme in ad-hoc
期刊论文
Tongxin Xuebao/Journal on Communications, 2009, 卷号: 30, 期号: 10 A, 页码: 85-92
作者:
Zhang, Qiu-Yu
;
Miao, Feng-Man
;
Yuan, Zhan-Ting
;
Wang, Rui-Fang
;
Zhang, Qi-Kun
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Public key cryptography
Expandability
Grid
Group key management
High connectivity
Key management
Logical structure
Server nodes
Weil pairing
©版权所有 ©2017 CSpace - Powered by
CSpace