CORC

浏览/检索结果: 共17条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A verifiable E-voting scheme with secret sharing 会议论文
16th IEEE International Conference on Communication Technology, ICCT 2015
作者:  Yuan L.;  Li M.;  Guo C.;  Hu W.;  Tan X.
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/09
A Verifiable E-voting Scheme with Secret Sharing 会议论文
IEEE 16th International Conference on Communication Technology (ICCT), Beijing, PEOPLES R CHINA
作者:  Yuan, Lifeng;  Li, Mingchu;  Guo, Cheng;  Hu, Weitong;  Tan, Xing
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/09
Publicly verifiable secret sharing scheme based on the Chinese Remainder Theorem 会议论文
International Conference on Mechatronics and Control Engineering (ICMCE 2012), Guangzhou, PEOPLES R CHINA, NOV 29-30, 2012
作者:  Jia, XX;  Wang, DS;  Wu, YJ
收藏  |  浏览/下载:3/0  |  提交时间:2017/01/20
verifiable multi-secret sharing schemes from homogeneous linear recursion 会议论文
2nd International Conference on e-Business and Information System Security, EBISS2010, Wuhan, China, 43973
He Jun; Li Lijuan; Li Ximei; Tang Chunming
收藏  |  浏览/下载:11/0  |  提交时间:2011/03/31
zero-knowledge argument for simultaneous discrete logarithms 会议论文
16th Annual International Computing and Combinatorics Conference, COCOON 2010, Nha Trang, Viet nam, 37456
Chow Sherman S. M.; Ma Changshe; Weng Jian
收藏  |  浏览/下载:15/0  |  提交时间:2011/03/31
A Practical Publicly Verifiable Secret Sharing Scheme Based on Bilinear Pairing 会议论文
Guiyang, PEOPLES R CHINA, AUG 20-23, 2008
作者:  Tian, Youliang;  Peng, Changgen;  Zhang, Renping;  Chen, Yuling
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/28
Publicly verifiable secret sharing with enrollment ability 会议论文
8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing/3rd ACIS International Workshop on Self-Assembling Wireless Networks, JUL 30-AUG 01, 2007
作者:  Yu, Jia;  Kong, Fanyu;  Hao, Rong
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/31
Publicly verifiable secret sharing with enrollment ability 会议论文
SNPD 2007: 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 30 July 2007 through 1 August 2007
作者:  Yu, Jia;  Kong, Fanyu;  Hao, Rong
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/31
Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing 会议论文
Wuhan Univ, Int Sch Software Engn, Wuhan, PEOPLES R CHINA, SEP 23-26, 2005
作者:  Peng, CG;  Li, X
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/02
Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing 会议论文
Wuhan, China, September 23, 2005 - September 26, 2005
作者:  Peng, Changgen;  Li, Xiang
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/02


©版权所有 ©2017 CSpace - Powered by CSpace