×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [8]
安徽大学 [2]
武汉理工大学 [2]
北京航空航天大学 [1]
自动化研究所 [1]
武汉大学 [1]
更多...
内容类型
期刊论文 [14]
会议论文 [2]
发表日期
2022 [1]
2019 [2]
2018 [2]
2017 [3]
2016 [3]
2015 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共16条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:
Li, Yuxing
;
Pang, Liaojun
;
Zhao, Heng
;
Cao, Zhicheng
;
Liu, Eryun
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2022/03/17
Biometrics (access control)
Transforms
Cryptography
Privacy
Hash functions
Feature extraction
Life sciences
Biometrics template protection
cancelable fingerprint template
fixed-length fingerprint representation
Indexing-Min-Max (IMM) hashing
security-performance tradeoff
Anonymous and Updatable Identity-Based Hash Proof System
期刊论文
IEEE SYSTEMS JOURNAL, 2019, 卷号: 13, 期号: 3, 页码: 2818-2829
作者:
Zhou, Yanwei
;
Yang, Bo*
;
Xia, Zhe
;
Mu, Yi
;
Wang, Tao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/04
Continuous leakage resilience
identity-based encryption (IBE)
identity-based hash proof system (IB-HPS)
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
期刊论文
JOURNAL OF SUPERCOMPUTING, 2019, 卷号: 75, 期号: 6, 页码: 3099-3122
作者:
Hu, Chengyu
;
Yang, Rupeng
;
Liu, Pengtao
;
Li, Tong
;
Kong, Fanyu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/11
Public-key encryption
Side-channel attacks
Tampering resilience
Leakage resilience
Continuous attacks
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience
期刊论文
Journal of Supercomputing, 2018
作者:
Hu C.
;
Yang R.
;
Liu P.
;
Li T.
;
Kong F.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/11
Continuous attacks
Leakage resilience
Public-key encryption
Side-channel attacks
Tampering resilience
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
期刊论文
Mobile Networks and Applications, 2018
作者:
Hu C.
;
Li Z.
;
Liu P.
;
Yang R.
;
Guo S.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Continual memory attacks
Keyword guessing attacks
Leakage resilience
PEKS
Verifiable
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments
期刊论文
IEEE Systems Journal, 2017, 卷号: 11, 期号: 2, 页码: 1018-1026
作者:
Zhang, Mingwu*
;
Zhang, Yudi
;
Su, Yixin
;
Huang, Qiong
;
Mu, Yi
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/04
Attribute-based encryption (ABE)
hash proof system (HPS)
lattice-based cryptosystem
leakage resilience
learning with errors
Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model
期刊论文
IEEE ACCESS, 2017, 卷号: 5
作者:
Ruan, Ou
;
Chen, Jing
;
Zhang, Mingwu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Leakage-resilience
password-based authenticated key exchange
side-channel attacks
trusted computing
internet of things
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application
期刊论文
International Journal of High Performance Computing and Networking, 2017, 卷号: 10, 期号: 3, 页码: 226-239
作者:
Hu, Chengyu
;
Liu, Pengtao
;
Guo, Shanqing
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/12
AHIBE
Anonymous hierarchical identity-based encryption
Leakage-resilient
Multi-keyword ranked search
Side-channel attacks
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
期刊论文
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 卷号: 7, 期号: 5, 页码: 681-692
作者:
Hu, Chengyu
;
Liu, Pengtao
;
Guo, Shanqing
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/16
Public-key encryption
Related-key security
Extractable hash proofs
Leakage resilience
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks
期刊论文
SOFT COMPUTING, 2016, 卷号: 20, 期号: 12, 页码: 4919-4932
作者:
Hu, Chengyu
;
Liu, Pengtao
;
Zhou, Yongbin
;
Guo, Shanqing
;
Wang, Yilei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/16
Leakage resilience
Related-key security
Extractable hash proofs
Public-key encryption
Intelligent agent security
©版权所有 ©2017 CSpace - Powered by
CSpace