×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [6]
四川大学 [1]
安徽大学 [1]
湖南大学 [1]
贵州大学 [1]
软件研究所 [1]
更多...
内容类型
期刊论文 [9]
会议论文 [2]
发表日期
2016 [11]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
限定条件
发表日期:2016
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Authenticated key exchange with entities from different settings and varied groups
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 期号: 12, 页码: 1843-1863
Guo, YF
;
Zhang, ZF
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2016/12/09
Authenticated Key Exchange
Security Model
Certificate-based protocols
Identity-based protocols
Three dimensional parameters estimation of wideband sources based on matching pursuit
期刊论文
Journal of Discrete Mathematical Sciences and Cryptography, 2016, 卷号: Vol.19 No.4, 页码: 849-861
作者:
Tang, L
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/02/25
Array signal processing
Sparse approximation
Three dimensional parameters estimation
Matching Pursuit
Keyword search protocol with privacy preservation using ID-based proxy reencryption
期刊论文
International Journal of Security and Networks, 2016, 卷号: Vol.11 No.4, 页码: 188-195
作者:
Feng Shao
;
Jie Cui
;
Run-hua Shi
;
Shun Zhang
;
Hong Zhong
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/22
cloud
computing
keyword
search
rank
search
privacy
preservation
identity-based
proxy
reencryption
privacy
protection
cloud
security
cryptography
user
revocation.
Size-invariant extended visual cryptography with embedded watermark based on error diffusion
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 卷号: 75, 期号: 18, 页码: 11157-11180
作者:
Yan, Bin
;
Wang, Ya-Fei
;
Song, Ling-Yun
;
Yang, Hong-Mei
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/16
Extended visual cryptography
Meaningful shares
Watermark
Error
diffusion
Influencing factor analysis of credit risk in P2P lending based on interpretative structural modeling
期刊论文
Journal of Discrete Mathematical Sciences and Cryptography, 2016, 卷号: 19, 期号: 3, 页码: 777-786
作者:
Ma, Hui-Zi
;
Wang, Xiang-Rong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/16
Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes
期刊论文
INFORMATION SECURITY AND PRIVACY, PT I, 2016, 卷号: 9722, 页码: 94-112
作者:
Liu, Zhe
;
Grosschadl, Johann
;
Li, Lin
;
Xu, Qiuliang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/16
Internet of Things
Lightweight cryptography
Montgomery curve
Twisted
Edwards curve
Multi-precision arithmetic
An improved analysis of broadcast attacks on the GGH cryptosystem
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 卷号: 9503, 页码: 146-158
作者:
Wang, Maoning
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/16
Broadcast attack
Cryptography
GGH
Information security
Lattice-based cryptosystems
A publicly verifiable secret sharing scheme based on multilinear diffie-hellman assumption
期刊论文
2016, 卷号: 18, 期号: 6, 页码: 1192-1200
作者:
Peng, Qiao
;
Tian, Youliang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/02
Bilateral authentication and key agreement protocol based on lightweight CA for wireless mesh networks
期刊论文
Computer Engineering and Application, 2016, 卷号: Vol.52 No.1, 页码: 95-99
作者:
Liao Junguo
;
Tan Yongzhou
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/31
wireless Mesh networks
lightweight Certificate Authority
bilateral authentication
key agreement
elliptic curve cryptography
A Flexible and Scalable Implementation of Elliptic Curve Cryptography over GF(p) based on ASIP
会议论文
35th IEEE International Performance Computing and Communications Conference (IPCCC), DEC 09-11, 2016
作者:
Qin, Yao
;
Wang, Hua
;
Jia, Zhiping
;
Xia, Hui
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
elliptic curve cryptography
point multiplication
prime fields
application specific instruction set processor
custom instruction set
©版权所有 ©2017 CSpace - Powered by
CSpace