×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [53]
内容类型
期刊论文 [35]
会议论文 [18]
发表日期
2019 [1]
2017 [3]
2016 [4]
2015 [1]
2014 [3]
2013 [8]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共53条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An Efficient and Secure Smart Card Based Authentication Scheme
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 4, 页码: 1113-1123
作者:
Chen, Chien-Ming
;
Xiang, Bin
;
Wang, King-Hang
;
Zhang, Yong
;
Wu, Tsu-Yang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Authentication key agreement
Biometric
Elliptic-curve cryptosystem
Smart card
BAN logic
Fault attack on an improved CRT-RSA algorithm with the modulus chaining method
期刊论文
Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017, 2017, 卷号: 1, 页码: 866-869
作者:
Kong, Fanyu
;
Zhou, Dashui
;
Jiang, Yali
;
Shang, Jianwei
;
Yu, Jia
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/12
digital signature
fault attack
RSA cryptosystem
side channel analysis
k-out-of-n Oblivious transfer protocol with security against malicious adversaries
期刊论文
COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2017, 卷号: 32, 期号: 2, 页码: 81-91
作者:
Wei, Xiaochao
;
Xu, Qiuliang
;
Tang, Yi
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/12
k-out-of-n oblivious transfer
full simulation
proof of partial
knowledge
dual-mode cryptosystem
Decisional Diffie-Hellman assumption
Privacy-preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control
会议论文
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, AUG 01-04, 2017
作者:
Liu, Meng
;
Zhang, Xuyun
;
Yang, Chi
;
Pang, Shaoning
;
Puthal, Deepak
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/31
privacy-preserving
secure multi-party computation
matrix product
homomorphic cryptosystem
statically mutually exclusive roles
Threshold attribute-based signcryption and its application to authenticated key agreement
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 期号: 18, 页码: 4914-4923
作者:
Zheng, Haibin
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/16
signcryption
attribute-based signcryption
standard model
threshold
cryptosystem
key agreement
Batch Public Key Cryptosystem with batch multi-exponentiation
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 卷号: 62, 页码: 196-204
作者:
Wu, Qianhong
;
Sun, Yang
;
Qin, Bo
;
Hu, Jiankun
;
Liu, Weiran
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/16
Modular exponentiation
Batch multi-exponentiation
Batch encryption
Batch decryption
Cramer-Shoup cryptosystem
Cloud security
Threshold Attribute-Based Signcryption in Standard Model
期刊论文
Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, 2016, 页码: 187-193
作者:
Zheng H.
;
Qin J.
;
Hu J.
;
Wu Q.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/16
Attribute-based signcryption
Signcryption
Standard model
Threshold cryptosystem
Threshold signcryption
An improved analysis of broadcast attacks on the GGH cryptosystem
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 卷号: 9503, 页码: 146-158
作者:
Wang, Maoning
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/16
Broadcast attack
Cryptography
GGH
Information security
Lattice-based cryptosystems
Threshold Attribute-Based Signcryption in Standard Model
会议论文
2nd International Conference on Cyber Security and Cloud Computing (CS Cloud), NOV 03-05, 2015
作者:
Zheng, Haibin
;
Qin, Jing
;
Hu, Jiankun
;
Wu, Qianhong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
Signcryption
Attribute-based signcryption
Standard model
Threshold
cryptosystem
Threshold signcryption
Fault attacks on hyperelliptic curve discrete logarithm problem over binary field
期刊论文
Science China(Information Sciences), 2014, 卷号: 57, 期号: 3, 页码: 187-203
作者:
WANG MingQiang
;
XUE HaiYang
;
ZHAN Tao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/17
hyperelliptic curve
discrete logarithm
binary field
genus
cryptosystem
©版权所有 ©2017 CSpace - Powered by
CSpace