×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [60]
内容类型
其他 [31]
期刊论文 [28]
会议论文 [1]
发表日期
2017 [2]
2016 [2]
2015 [7]
2014 [4]
2013 [9]
2012 [8]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共60条,第1-10条
帮助
限定条件
专题:北京大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017
He, Debiao
;
Wang, Ding
;
Xie, Qi
;
Chen, Kefei
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
PRESERVING AUTHENTICATION
SENSOR NETWORKS
SCHEME
SECURE
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
期刊论文
Science China. Information Science, 2017
He Debiao
;
Wang Ding
;
Xie Qi
;
Chen Kefei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2017/12/03
mobile wireless network
handover authentication
anonymity
conditional privacy preservation
provable security
On the Implications of Zipf's Law in Passwords
其他
2016-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
AUTHENTICATION
EFFICIENT
Wireless Physical-Layer Identification: Modeling and Validation
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016
Wang, Wenhao
;
Sun, Zhi
;
Piao, Sixu
;
Zhu, Bocheng
;
Ren, Kui
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/04
Radio frequency fingerprinting
physical-layer security
wireless communication
multipath channels
SPECTRAL REGROWTH
FINGERPRINTS
USERS
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
期刊论文
INFORMATION SCIENCES, 2015
Wang, Ding
;
Wang, Nan
;
Wang, Ping
;
Qing, Sihan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
User anonymity
De-synchronization
Random oracle model
WIRELESS SENSOR NETWORKS
KEY AGREEMENT PROTOCOL
SMART-CARDS
PASSWORD AUTHENTICATION
MUTUAL AUTHENTICATION
MOBILE NETWORKS
ROBUST
EXCHANGE
ENHANCEMENT
CRYPTANALYSIS
Accelerating RSA with Fine-Grained Parallelism Using GPU
其他
2015-01-01
Yang, Yang
;
Guan, Zhi
;
Sun, Huiping
;
Chen, Zhong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
RSA
GPGPU
CUDA
Montgomery Multiplication
CRT
ASYMMETRIC CRYPTOGRAPHY
GRAPHICS HARDWARE
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015
Wang, Ding
;
He, Debiao
;
Wang, Ping
;
Chu, Chao-Hsien
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Two-factor authentication
user anonymity
offline dictionary attack
de-synchronization attack
smart card loss attack
SMART-CARDS
PASSWORD AUTHENTICATION
SECURITY ANALYSIS
USER ANONYMITY
SCHEME
ATTACKS
KEY
EFFICIENT
NETWORKS
PROTOCOLS
A variant of schnorr signature scheme for path-checking in RFID-based supply chains
其他
2015-01-01
Xin, Wei
;
Wang, Meilin
;
Shao, Shuai
;
Wang, Zhao
;
Zhang, Tao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
On the Usability of Two-Factor Authentication
其他
2015-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
Two-factor authentication
Usability
User anonymity
SMART-CARD
PASSWORD AUTHENTICATION
SCHEME
A Variant of Schnorr Signature Scheme for Path-Checking in RFID-based Supply Chains
其他
2015-01-01
Xin, Wei
;
Wang, Meilin
;
Shao, Shuai
;
Wang, Zhao
;
Zhang, Tao
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
RFID
schnorr signature
path-checking
supply chain
SECURITY
©版权所有 ©2017 CSpace - Powered by
CSpace