CORC

浏览/检索结果: 共11条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Authenticated key exchange with entities from different settings and varied groups 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 期号: 12, 页码: 1843-1863
Guo, YF; Zhang, ZF
收藏  |  浏览/下载:17/0  |  提交时间:2016/12/09
Three dimensional parameters estimation of wideband sources based on matching pursuit 期刊论文
Journal of Discrete Mathematical Sciences and Cryptography, 2016, 卷号: Vol.19 No.4, 页码: 849-861
作者:  Tang, L
收藏  |  浏览/下载:4/0  |  提交时间:2019/02/25
Keyword search protocol with privacy preservation using ID-based proxy reencryption 期刊论文
International Journal of Security and Networks, 2016, 卷号: Vol.11 No.4, 页码: 188-195
作者:  Feng Shao;  Jie Cui;  Run-hua Shi;  Shun Zhang;  Hong Zhong
收藏  |  浏览/下载:6/0  |  提交时间:2019/04/22
Size-invariant extended visual cryptography with embedded watermark based on error diffusion 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 卷号: 75, 期号: 18, 页码: 11157-11180
作者:  Yan, Bin;  Wang, Ya-Fei;  Song, Ling-Yun;  Yang, Hong-Mei
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/16
Influencing factor analysis of credit risk in P2P lending based on interpretative structural modeling 期刊论文
Journal of Discrete Mathematical Sciences and Cryptography, 2016, 卷号: 19, 期号: 3, 页码: 777-786
作者:  Ma, Hui-Zi;  Wang, Xiang-Rong
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/16
Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes 期刊论文
INFORMATION SECURITY AND PRIVACY, PT I, 2016, 卷号: 9722, 页码: 94-112
作者:  Liu, Zhe;  Grosschadl, Johann;  Li, Lin;  Xu, Qiuliang
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/16
An improved analysis of broadcast attacks on the GGH cryptosystem 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 卷号: 9503, 页码: 146-158
作者:  Wang, Maoning
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/16
A publicly verifiable secret sharing scheme based on multilinear diffie-hellman assumption 期刊论文
2016, 卷号: 18, 期号: 6, 页码: 1192-1200
作者:  Peng, Qiao;  Tian, Youliang
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/02
Bilateral authentication and key agreement protocol based on lightweight CA for wireless mesh networks 期刊论文
Computer Engineering and Application, 2016, 卷号: Vol.52 No.1, 页码: 95-99
作者:  Liao Junguo;  Tan Yongzhou
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/31
A Flexible and Scalable Implementation of Elliptic Curve Cryptography over GF(p) based on ASIP 会议论文
35th IEEE International Performance Computing and Communications Conference (IPCCC), DEC 09-11, 2016
作者:  Qin, Yao;  Wang, Hua;  Jia, Zhiping;  Xia, Hui
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/31


©版权所有 ©2017 CSpace - Powered by CSpace