CORC

浏览/检索结果: 共27条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Computational soundness of uniformity properties for multi-party computation based on LSSS 会议论文
7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015, December 7, 2015 - December 8, 2015
作者:  Zhao, Hui;  Sakurai, Kouichi
收藏  |  浏览/下载:11/0  |  提交时间:2019/12/31
A note on the security of KHL scheme 期刊论文
2015, 卷号: 602, 页码: 1
作者:  Weng, Jian[1,2];  Zhao, Yunlei[3];  Deng, Robert H.[4];  Liu, Shengli[5];  Yang, Yanjiang[6]
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/13
Fine-grained conditional proxy re-encryption and application 期刊论文
2014, 卷号: 8782, 页码: 206
作者:  Yang, Yanjiang[1];  Lu, Haibing[2];  Weng, Jian[3,5];  Zhang, Youcheng[4];  Sakurai, Kouichi[5]
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/17
Evolution of cooperation in reputation system by group-based scheme 期刊论文
JOURNAL OF SUPERCOMPUTING, 2013, 卷号: 63, 页码: 171-190
作者:  Ren, Yizhi;  Li, Mingchu;  Xiang, Yang;  Cui, Yongrui;  Sakurai, Kouichi
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/11
On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption 期刊论文
2012, 卷号: 17, 页码: 3303-3327
作者:  Zhao, Liang[1,2];  Adhikari, Avishek[3];  Xiao, Di[2];  Sakurai, Kouichi
收藏  |  浏览/下载:6/0  |  提交时间:2019/11/30
Flexible service selection with user-specific QoS support in service-oriented architecture 期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 卷号: 35, 页码: 962-973
作者:  Zhao, Laiping;  Ren, Yizhi;  Li, Mingchu;  Sakurai, Kouichi
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/13
A Finite Equivalence of Verifiable Multi-secret Sharing 期刊论文
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 卷号: 5, 页码: 1-12
作者:  Zhao, Hui;  Li, Mingchu;  Sakurai, Kouichi;  Ren, Yizhi;  Sun, Jonathan Z.
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/13
A Finite Equivalence of Verifiable Multi-secret Sharing 期刊论文
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 卷号: 5, 期号: 1, 页码: 1-12
作者:  Zhao, Hui;  Li, Mingchu;  Sakurai, Kouichi;  Ren, Yizhi;  Sun, Jonathan Z.
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/23
Efficient Context-Sensitive Intrusion Detection Based on State Transition Table 期刊论文
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, 卷号: E94A, 页码: 255-264
作者:  Hua, Jingyu;  Li, Mingchu;  Ren, Yizhi;  Sakurai, Kouichi
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/18
FineTrust: a fine-grained trust model for peer-to-peer networks 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2011, 卷号: 4, 页码: 61-69
作者:  Ren, Yizhi;  Li, Mingchu;  Sakurai, Kouichi
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/18


©版权所有 ©2017 CSpace - Powered by CSpace