×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
华南理工大学 [4]
贵州大学 [3]
大连理工大学 [2]
山东大学 [2]
湖南大学 [2]
软件研究所 [2]
更多...
内容类型
会议论文 [17]
发表日期
2016 [1]
2015 [1]
2013 [1]
2010 [2]
2008 [1]
2007 [2]
更多...
学科主题
automation... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共17条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A verifiable E-voting scheme with secret sharing
会议论文
16th IEEE International Conference on Communication Technology, ICCT 2015
作者:
Yuan L.
;
Li M.
;
Guo C.
;
Hu W.
;
Tan X.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/09
A Verifiable E-voting Scheme with Secret Sharing
会议论文
IEEE 16th International Conference on Communication Technology (ICCT), Beijing, PEOPLES R CHINA
作者:
Yuan, Lifeng
;
Li, Mingchu
;
Guo, Cheng
;
Hu, Weitong
;
Tan, Xing
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/09
E-voting
Verifiability
Secret sharing
Accountability
Distribution
Publicly verifiable secret sharing scheme based on the Chinese Remainder Theorem
会议论文
International Conference on Mechatronics and Control Engineering (ICMCE 2012), Guangzhou, PEOPLES R CHINA, NOV 29-30, 2012
作者:
Jia, XX
;
Wang, DS
;
Wu, YJ
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/01/20
publicly verifiable secret sharing
joint random secret share
Chinese Remainder Theorem
verifiable multi-secret sharing schemes from homogeneous linear recursion
会议论文
2nd International Conference on e-Business and Information System Security, EBISS2010, Wuhan, China, 43973
He Jun
;
Li Lijuan
;
Li Ximei
;
Tang Chunming
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2011/03/31
Cryptography
Electronic commerce
Information systems
zero-knowledge argument for simultaneous discrete logarithms
会议论文
16th Annual International Computing and Combinatorics Conference, COCOON 2010, Nha Trang, Viet nam, 37456
Chow Sherman S. M.
;
Ma Changshe
;
Weng Jian
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2011/03/31
Cryptography
A Practical Publicly Verifiable Secret Sharing Scheme Based on Bilinear Pairing
会议论文
Guiyang, PEOPLES R CHINA, AUG 20-23, 2008
作者:
Tian, Youliang
;
Peng, Changgen
;
Zhang, Renping
;
Chen, Yuling
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/28
Publicly verifiable secret sharing with enrollment ability
会议论文
8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing/3rd ACIS International Workshop on Self-Assembling Wireless Networks, JUL 30-AUG 01, 2007
作者:
Yu, Jia
;
Kong, Fanyu
;
Hao, Rong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
Publicly verifiable secret sharing with enrollment ability
会议论文
SNPD 2007: 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 30 July 2007 through 1 August 2007
作者:
Yu, Jia
;
Kong, Fanyu
;
Hao, Rong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing
会议论文
Wuhan Univ, Int Sch Software Engn, Wuhan, PEOPLES R CHINA, SEP 23-26, 2005
作者:
Peng, CG
;
Li, X
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/02
Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing
会议论文
Wuhan, China, September 23, 2005 - September 26, 2005
作者:
Peng, Changgen
;
Li, Xiang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/02
©版权所有 ©2017 CSpace - Powered by
CSpace