CORC

浏览/检索结果: 共23条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
An integrity verification scheme of completeness and zero-knowledge for multi-Cloud storage 期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 卷号: 30, 期号: 16
作者:  Cao, Laicheng;  He, Wenwen;  Liu, Yufei;  Guo, Xian;  Feng, Tao
收藏  |  浏览/下载:3/0  |  提交时间:2019/11/15
Code-based provable data possession scheme for integrity verification in cloud storage 期刊论文
Proceedings - 2016 International Conference on Network and Information Systems for Computers, ICNISC 2016, 2017, 页码: 207-212
作者:  Ye, Junyao;  Wang, Yanhong;  Liu, Kening
收藏  |  浏览/下载:17/0  |  提交时间:2018/12/29
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
He, Debiao; Wang, Ding; Xie, Qi; Chen, Kefei
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation 期刊论文
Science China. Information Science, 2017
He Debiao; Wang Ding; Xie Qi; Chen Kefei
收藏  |  浏览/下载:12/0  |  提交时间:2017/12/03
A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography 期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 卷号: 30, 期号: 16
作者:  Luo, Min;  Zhang, Yunru;  Khan, Muhammad Khurram;  He, Debiao
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
A secure and efficient public auditing scheme using RSA algorithm for cloud storage 期刊论文
JOURNAL OF SUPERCOMPUTING, 2017, 卷号: 73, 期号: 12
作者:  Xu, Zhiyan;  Wu, Libing;  Khan, Muhammad Khurram;  Choo, Kim-Kwang Raymond;  He, Debiao
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage 期刊论文
INFORMATION SCIENCES, 2017, 卷号: 375
作者:  He, Debiao;  Wang, Huaqun;  Zhang, Jianhong;  Wang, Lina
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Anonymous Authentication for Wireless Body Area Networks With Provable Security 期刊论文
IEEE SYSTEMS JOURNAL, 2017, 卷号: 11, 期号: 4
作者:  He, Debiao;  Zeadally, Sherali;  Kumar, Neeraj;  Lee, Jong-Hyouk
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/05
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017, 卷号: 60, 期号: 5
作者:  He, Debiao;  Wang, Ding;  Xie, Qi;  Chen, Kefei
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 期号: 2
作者:  He, Debiao;  Kumar, Neeraj;  Choo, Kim-Kwang Raymond;  Wu, Wei
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace