CORC

浏览/检索结果: 共10条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
efficient and distributed authentication scheme for secure communication in manet 期刊论文
Journal of Computational Information Systems, 2013, 卷号: 9, 期号: 1, 页码: 57-64
Wang Daxing; Teng Jikai
收藏  |  浏览/下载:14/0  |  提交时间:2013/09/17
一种适用于卫星通信网络的端到端认证协议 期刊论文
计算机研究与发展, 2013, 卷号: 50, 期号: 3, 页码: 540-547
张小亮; 涂勇策; 马恒太; 杨治安; 胡晓惠
收藏  |  浏览/下载:20/0  |  提交时间:2013/09/17
云计算环境虚拟机匿名身份证明方案 期刊论文
软件学报, 2013, 卷号: 24, 期号: 12, 页码: 2897-2908
张严; 冯登国; 于爱民
收藏  |  浏览/下载:10/0  |  提交时间:2014/12/16
Cryptanalysis of Helix and Phelix revisited 会议论文
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1); Zhang, Bin (2); Feng, Dengguo (1)
收藏  |  浏览/下载:16/0  |  提交时间:2014/12/16
an efficient certificateless aggregate signature with constant pairing computations 期刊论文
INFORMATION SCIENCES, 2013, 卷号: 219, 页码: 225-235
Xiong Hu; Guan Zhi; Chen Zhong; Li Fagen
收藏  |  浏览/下载:15/0  |  提交时间:2013/09/17
Leaked-state-forgery attack against the authenticated encryption algorithm ALE 会议论文
19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013, Bengaluru, India, December 1, 2013 - December 5, 2013
Wu, Shengbao (1); Wu, Hongjun (2); Huang, Tao (2); Wang, Mingsheng (4); Wu, Wenling (1)
收藏  |  浏览/下载:10/0  |  提交时间:2014/12/16
boomerang and slide-rotational analysis of the sm3 hash function 会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Kircanski Aleksandar; Shen Yanzhao; Wang Gaoli; Youssef Amr M.
收藏  |  浏览/下载:8/0  |  提交时间:2013/09/22
Analysis and enhancement of an optimized gateway-oriented password-based authenticated key exchange protocol 期刊论文
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013, 卷号: E96-A, 期号: 9, 页码: 1864-1871
Wei, Fushan (1); Zhang, Zhenfeng (3); Ma, Chuangui (1)
收藏  |  浏览/下载:12/0  |  提交时间:2014/12/16
cryptanalysis of some certificateless signature schemes in the standard model 期刊论文
International Journal of Applied Mathematics and Statistics, 2013, 卷号: 36, 期号: 6, 页码: 16-25
Wu Chenhuang; Lin Weidi; Huang Hui; Chen Zhixiong
收藏  |  浏览/下载:10/0  |  提交时间:2013/09/17
efficient authentication of scalable media streams over wireless networks 期刊论文
Multimedia Tools and Applications, 2013, 页码: 1-23
Yi Xiaowei; Zheng Gang; Li Mingyu; Ma Hengtai; Zheng Changwen
收藏  |  浏览/下载:24/0  |  提交时间:2013/09/17


©版权所有 ©2017 CSpace - Powered by CSpace