CORC

浏览/检索结果: 共101条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0 期刊论文
COMPUTER NETWORKS, 2020, 卷号: 179, 页码: 18
作者:  Zhang, Qianying;  Zhao, Shijun
收藏  |  浏览/下载:9/0  |  提交时间:2020/12/10
Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 页码: 878-890
作者:  Zhang, Jie;  Huang, Xin;  Wang, Wei;  Yue, Yong
收藏  |  浏览/下载:15/0  |  提交时间:2019/11/19
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications 期刊论文
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 卷号: 10, 期号: 8, 页码: 3133-3142
作者:  Chen, Chien-Ming;  Wang, King-Hang;  Yeh, Kuo-Hui;  Xiang, Bin;  Wu, Tsu-Yang
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/11
Signature-based three-factor authenticated key exchange for internet of things applications 期刊论文
Multimedia Tools and Applications, 2018
作者:  Li, Li;  Jia, Xiaoying;  He, Debiao;  Choo, Kim-Kwang Raymond
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Signature-based three-factor authenticated key exchange for internet of things applications 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 期号: 14
作者:  Jia, Xiaoying;  He, Debiao;  Li, Li;  Choo, Kim-Kwang Raymond
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
A general compiler for password-authenticated group key exchange protocol in the standard model 期刊论文
DISCRETE APPLIED MATHEMATICS, 2018, 卷号: 241
作者:  Wei, Fushan;  Kumar, Neeraj;  He, Debiao;  Yeo, Sang-Soo
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
A provably-secure two-factor authenticated key exchange protocol with stronger anonymity 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 11058 LNCS, 页码: 111-124
作者:  Yang, Xiaoyan;  Jiang, Han;  Hou, Mengbo;  Zheng, Zhihua;  Xu, Qiuliang
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/11
Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps 期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2018, 卷号: 19, 期号: 3, 页码: 679-687
作者:  Chen, Chien-Ming;  Xu, Linlin;  Wang, King-Hang;  Liu, Shuai;  Wu, Tsu-Yang
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/11
A new verifier-based anonymous password-authenticated key exchange protocol 期刊论文
Journal of Information Hiding and Multimedia Signal Processing, 2018, 卷号: 9, 期号: 6, 页码: 1595-1602
作者:  Chen, Chien-Ming;  Wang, Guangjie;  Fang, Weicheng;  Wu, Tsu-Yang
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/11
A Framework of Secure Delivery Service for Targeted Coupons with Encrypted Search 期刊论文
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2017, 卷号: 51, 页码: 13-19
作者:  Jiang, Jinghua;  Gui, Xiaolin;  Zheng, Yifeng;  Zhang, Xuejun;  Yuan, Xingliang
收藏  |  浏览/下载:13/0  |  提交时间:2019/11/26


©版权所有 ©2017 CSpace - Powered by CSpace