CORC

浏览/检索结果: 共16条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates 期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:  Li, Yuxing;  Pang, Liaojun;  Zhao, Heng;  Cao, Zhicheng;  Liu, Eryun
收藏  |  浏览/下载:37/0  |  提交时间:2022/03/17
Anonymous and Updatable Identity-Based Hash Proof System 期刊论文
IEEE SYSTEMS JOURNAL, 2019, 卷号: 13, 期号: 3, 页码: 2818-2829
作者:  Zhou, Yanwei;  Yang, Bo*;  Xia, Zhe;  Mu, Yi;  Wang, Tao
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/04
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience 期刊论文
JOURNAL OF SUPERCOMPUTING, 2019, 卷号: 75, 期号: 6, 页码: 3099-3122
作者:  Hu, Chengyu;  Yang, Rupeng;  Liu, Pengtao;  Li, Tong;  Kong, Fanyu
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/11
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience 期刊论文
Journal of Supercomputing, 2018
作者:  Hu C.;  Yang R.;  Liu P.;  Li T.;  Kong F.
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/11
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks 期刊论文
Mobile Networks and Applications, 2018
作者:  Hu C.;  Li Z.;  Liu P.;  Yang R.;  Guo S.
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments 期刊论文
IEEE Systems Journal, 2017, 卷号: 11, 期号: 2, 页码: 1018-1026
作者:  Zhang, Mingwu*;  Zhang, Yudi;  Su, Yixin;  Huang, Qiong;  Mu, Yi
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/04
Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model 期刊论文
IEEE ACCESS, 2017, 卷号: 5
作者:  Ruan, Ou;  Chen, Jing;  Zhang, Mingwu
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application 期刊论文
International Journal of High Performance Computing and Networking, 2017, 卷号: 10, 期号: 3, 页码: 226-239
作者:  Hu, Chengyu;  Liu, Pengtao;  Guo, Shanqing;  Xu, Qiuliang
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/12
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs 期刊论文
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 卷号: 7, 期号: 5, 页码: 681-692
作者:  Hu, Chengyu;  Liu, Pengtao;  Guo, Shanqing
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/16
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks 期刊论文
SOFT COMPUTING, 2016, 卷号: 20, 期号: 12, 页码: 4919-4932
作者:  Hu, Chengyu;  Liu, Pengtao;  Zhou, Yongbin;  Guo, Shanqing;  Wang, Yilei
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/16


©版权所有 ©2017 CSpace - Powered by CSpace