×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [9]
内容类型
其他 [9]
发表日期
2016 [1]
2015 [2]
2014 [1]
2012 [1]
2011 [1]
2010 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
限定条件
内容类型:其他
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
其他
2016-01-01
Wang, Ding
;
Gu, Qianchen
;
Cheng, Haibo
;
Wang, Ping
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Two-factor authentication
Smart card loss attack
Two-factor security
De-synchronization attack
Measurement
MEDICINE INFORMATION-SYSTEMS
SMART-CARDS
PASSWORD AUTHENTICATION
USER AUTHENTICATION
ROBUST
PROTOCOL
ANONYMITY
NETWORKS
Location Semantics Protection Based on Bayesian Inference
其他
2015-01-01
Wu, Zhengang
;
Chen, Zhong
;
Zhu, Jiawei
;
Sun, Huiping
;
Guan, Zhi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Location privacy protection
Location semantics
Bayesian inference
Spatial cloaking
K-ANONYMITY
PRIVACY
QUERIES
On the Usability of Two-Factor Authentication
其他
2015-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
Two-factor authentication
Usability
User anonymity
SMART-CARD
PASSWORD AUTHENTICATION
SCHEME
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services
其他
2014-01-01
Wu, Zhengang
;
Yu, Liangwen
;
Sun, Huiping
;
Guan, Zhi
;
Chen, Zhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2015/11/16
Caching
Cloaking
Location privacy
Location Bases Services
Query processing
K-ANONYMITY
Some Thoughts on Strong Unforgeability in Ring Signature Schemes
其他
2012-01-01
Wang, Chen
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2015/11/13
Strong Unforgeability
Ring Signature
Anonymity
Standard Model
AD-HOC GROUPS
RANDOM ORACLES
A Variant of Boyen-Waters Anonymous IBE Scheme
其他
2011-01-01
Luo, Song
;
Shen, Qingni
;
Jin, Yongming
;
Chen, Yu
;
Chen, Zhong
;
Qing, Sihan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/16
Identity-Based Encryption
Anonymity
Transformation
IDENTITY-BASED ENCRYPTION
CONSTANT SIZE CIPHERTEXT
DUAL SYSTEM ENCRYPTION
PUBLIC-KEY ENCRYPTION
RANDOM ORACLES
CONSISTENCY PROPERTIES
HIBE
CONSTRUCTIONS
EXTENSIONS
Attribute-Based Signature with Policy-and-Endorsement Mechanism
其他
2010-01-01
Wang, Huai-Xi
;
Zhu, Yan
;
Feng, Rong-Quan
;
Yau, Stephen S.
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2015/11/13
cryptography
fine-grained access control
attribute-based signature
policy-and-endorsement
selfless anonymity
existential unforgeability
New efficient user identification and key distribution scheme providing enhanced security
其他
2004-01-01
Yang, YJ
;
Wang, SH
;
Bao, F
;
Wang, J
;
Deng, RH
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2015/11/12
user identification
authentication
key distribution
login
anonymity
An efficient identity-based group signature scheme over elliptic curves
其他
2004-01-01
Han, S
;
Wang, J
;
Liu, WQ
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/15
group signatures
anonymity
network security
Weil pairings
security protocol
PAIRING-BASED CRYPTOSYSTEMS
©版权所有 ©2017 CSpace - Powered by
CSpace