×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [11]
北京航空航天大学 [5]
北京大学 [2]
兰州理工大学 [1]
山东大学 [1]
湖南大学 [1]
更多...
内容类型
期刊论文 [21]
会议论文 [2]
发表日期
2017 [23]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共23条,第1-10条
帮助
限定条件
发表日期:2017
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An integrity verification scheme of completeness and zero-knowledge for multi-Cloud storage
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 卷号: 30, 期号: 16
作者:
Cao, Laicheng
;
He, Wenwen
;
Liu, Yufei
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/15
cloud storage security
dynamic operations
integrity verification
provable data possession
zero-knowledge
Code-based provable data possession scheme for integrity verification in cloud storage
期刊论文
Proceedings - 2016 International Conference on Network and Information Systems for Computers, ICNISC 2016, 2017, 页码: 207-212
作者:
Ye, Junyao
;
Wang, Yanhong
;
Liu, Kening
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2018/12/29
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
He, Debiao
;
Wang, Ding
;
Xie, Qi
;
Chen, Kefei
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
PRESERVING AUTHENTICATION
SENSOR NETWORKS
SCHEME
SECURE
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
Science China. Information Science, 2017
He Debiao
;
Wang Ding
;
Xie Qi
;
Chen Kefei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2017/12/03
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 卷号: 30, 期号: 16
作者:
Luo, Min
;
Zhang, Yunru
;
Khan, Muhammad Khurram
;
He, Debiao
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
elliptic curve cryptography
password
provable security
smart card
A secure and efficient public auditing scheme using RSA algorithm for cloud storage
期刊论文
JOURNAL OF SUPERCOMPUTING, 2017, 卷号: 73, 期号: 12
作者:
Xu, Zhiyan
;
Wu, Libing
;
Khan, Muhammad Khurram
;
Choo, Kim-Kwang Raymond
;
He, Debiao
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Cloud storage
Data integrity checking
Data recovery attack
Provable security
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
期刊论文
INFORMATION SCIENCES, 2017, 卷号: 375
作者:
He, Debiao
;
Wang, Huaqun
;
Zhang, Jianhong
;
Wang, Lina
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Public auditing
Identity-based cryptography
Provable security
Bilinear pairing
Anonymous Authentication for Wireless Body Area Networks With Provable Security
期刊论文
IEEE SYSTEMS JOURNAL, 2017, 卷号: 11, 期号: 4
作者:
He, Debiao
;
Zeadally, Sherali
;
Kumar, Neeraj
;
Lee, Jong-Hyouk
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
Attack
authentication
security
wireless body area network (WBAN)
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017, 卷号: 60, 期号: 5
作者:
He, Debiao
;
Wang, Ding
;
Xie, Qi
;
Chen, Kefei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 期号: 2
作者:
He, Debiao
;
Kumar, Neeraj
;
Choo, Kim-Kwang Raymond
;
Wu, Wei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Automatic dependent surveillance-broadcast
authentication
batch verification
hierarchical identity-based signature
provable security
©版权所有 ©2017 CSpace - Powered by
CSpace