CORC

浏览/检索结果: 共53条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
An Efficient and Secure Smart Card Based Authentication Scheme 期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 4, 页码: 1113-1123
作者:  Chen, Chien-Ming;  Xiang, Bin;  Wang, King-Hang;  Zhang, Yong;  Wu, Tsu-Yang
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/11
Fault attack on an improved CRT-RSA algorithm with the modulus chaining method 期刊论文
Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017, 2017, 卷号: 1, 页码: 866-869
作者:  Kong, Fanyu;  Zhou, Dashui;  Jiang, Yali;  Shang, Jianwei;  Yu, Jia
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/12
k-out-of-n Oblivious transfer protocol with security against malicious adversaries 期刊论文
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2017, 卷号: 32, 期号: 2, 页码: 81-91
作者:  Wei, Xiaochao;  Xu, Qiuliang;  Tang, Yi
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/12
Privacy-preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control 会议论文
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, AUG 01-04, 2017
作者:  Liu, Meng;  Zhang, Xuyun;  Yang, Chi;  Pang, Shaoning;  Puthal, Deepak
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/31
Threshold attribute-based signcryption and its application to authenticated key agreement 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 期号: 18, 页码: 4914-4923
作者:  Zheng, Haibin;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/16
Batch Public Key Cryptosystem with batch multi-exponentiation 期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 卷号: 62, 页码: 196-204
作者:  Wu, Qianhong;  Sun, Yang;  Qin, Bo;  Hu, Jiankun;  Liu, Weiran
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/16
Threshold Attribute-Based Signcryption in Standard Model 期刊论文
Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, 2016, 页码: 187-193
作者:  Zheng H.;  Qin J.;  Hu J.;  Wu Q.
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/16
An improved analysis of broadcast attacks on the GGH cryptosystem 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 卷号: 9503, 页码: 146-158
作者:  Wang, Maoning
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/16
Threshold Attribute-Based Signcryption in Standard Model 会议论文
2nd International Conference on Cyber Security and Cloud Computing (CS Cloud), NOV 03-05, 2015
作者:  Zheng, Haibin;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/31
Fault attacks on hyperelliptic curve discrete logarithm problem over binary field 期刊论文
Science China(Information Sciences), 2014, 卷号: 57, 期号: 3, 页码: 187-203
作者:  WANG MingQiang;  XUE HaiYang;  ZHAN Tao
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/17


©版权所有 ©2017 CSpace - Powered by CSpace