CORC

浏览/检索结果: 共13条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Practical parallel key-insulated encryption with multiple helper keys 期刊论文
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 卷号: 65, 页码: 1403-1412
作者:  Ren, Yanli[1];  Wang, Shuozhong[2];  Zhang, Xinpeng[3]
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/30
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme 期刊论文
2011, 卷号: 84, 期号: 2, 页码: 219
作者:  Wang, Xu An[2];  Weng, Jian[1,3,4];  Yang, Xiaoyuan[2];  Zhang, Minqing[2]
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/06
Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption 期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2011, 卷号: 12, 页码: 647-658
作者:  Ren, Yanli[1];  Wang, Shuozhong[2];  Zhang, Xinpeng[3]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/30
Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys 会议论文
PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011-01-01
作者:  Ren, Yanli[1];  Wang, Shuozhong[2];  Zhang, Xinpeng[3];  Qian, Zhenxing[4]
收藏  |  浏览/下载:1/0  |  提交时间:2019/04/30
generic constructions of parallel key-insulated encryption 会议论文
7th International Conference on Security and Cryptography for Networks, SCN 2010, Amalfi, Italy, September
Hanaoka Goichiro; Weng Jian
收藏  |  浏览/下载:11/0  |  提交时间:2011/03/31
cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme 期刊论文
Journal of Systems and Software, 2010, 卷号: 84, 期号: 2, 页码: -
Wang Xu An; Weng Jian; Yang Xiaoyuan; Zhang Minqing
收藏  |  浏览/下载:8/0  |  提交时间:2011/05/24
Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys 会议论文
International Colloquium on Computing, Communication, Control, and Management (CCCM 2010)
作者:  Ren, Yanli[1];  Wang, Shuozhong[2];  Zhang, Xinpeng[3];  Qian, Zhenxing[4]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/30
Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys 会议论文
International Colloquium on Computing, Communication, Control, and Management (CCCM 2010)
作者:  Ren, Yanli[1];  Wang, Shuozhong[2];  Zhang, Xinpeng[3];  Qian, Zhenxing[4]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/30
Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys 会议论文
International Colloquium on Computing, Communication, Control, and Management (CCCM 2010)
作者:  Ren, Yanli[1];  Wang, Shuozhong[2];  Zhang, Xinpeng[3];  Qian, Zhenxing[4]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/30
Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys 会议论文
2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010-01-01
作者:  Ren, Yanli[1];  Wang, Shuozhong[2];  Zhang, Xinpeng[3];  Qian, Zhenxing[4]
收藏  |  浏览/下载:2/0  |  提交时间:2019/04/30


©版权所有 ©2017 CSpace - Powered by CSpace