CORC

浏览/检索结果: 共12条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
Identity-based authenticate key exchange protocol from lattice 期刊论文
Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, 2013, 页码: 564-568
作者:  Wang, Hao;  Zhao, Chuan;  Xu, Qiuliang;  Wang, Yilei
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/23
A two-party certificateless authenticated key agreement protocol with provable security 期刊论文
Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, 2013, 页码: 559-563
作者:  Guiying, Li;  Mengbo, Hou;  Chuan, Zhao;  Qiuliang, Xu
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/23
New certificateless public key encryption scheme without pairing 期刊论文
IET information security, 2013, 卷号: 7, 期号: 4, 页码: 271-276
作者:  Xiaopeng Yan;  Peng Gong;  Zhiquan Bai;  Jiantao Wang;  Ping Li
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/23
Identity-Based Authenticate Key Exchange Protocol from Lattice 会议论文
9th International Conference on Computational Intelligence and Security (CIS), DEC 14-15, 2013
作者:  Wang, Hao;  Zhao, Chuan;  Xu, Qiuliang;  Wang, Yilei
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/31
ATwo-party Certificateless Authenticated Key Agreement Protocol with provable security 会议论文
9th International Conference on Computational Intelligence and Security (CIS), DEC 14-15, 2013
作者:  Li Gui-ying;  Hou Meng-bo;  Zhao Chuan;  Xu Qiu-liang
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/31
An efficient certificateless ID-based signcrption scheme based on a pair of secrete values 期刊论文
Journal of Information and Computational Science, 2011, 卷号: 8, 期号: 13, 页码: 2535-2543
作者:  Tian Y.;  Du T.;  Qu S.;  Ren L.;  Xu J.
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/23
Attribute-based authenticated key exchange protocol with general relations 期刊论文
Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011, 2011, 页码: 900-904
作者:  Wang, Hao;  Xu, Qiuliang;  Jiang, Han;  Li, Rui
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/23
A fully anonymous identity-based signcryption scheme in the standard model 期刊论文
Proceedings - 2010 International Conference on Computational Intelligence and Security, CIS 2010, 2010, 页码: 372-376
作者:  Wang, Hao;  Xu, Qiuliang;  Jiang, Han;  Zhao, Xiufeng
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/26
A provably secure two-party attribute-based key agreement protocol 期刊论文
IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009, 页码: 1042-1045
作者:  Wang, Hao;  Xu, Qiuliang;  Ban, Tao
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/26
Modification and improvement on group signature scheme without random oracles 期刊论文
Proceedings of the International Symposium on Electronic Commerce and Security, ISECS 2008, 2008, 页码: 462-466
作者:  Wang, Shaohui
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/26


©版权所有 ©2017 CSpace - Powered by CSpace