CORC

浏览/检索结果: 共7条,第1-7条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
formal analysis of trusted platform module commands for compromising user key 期刊论文
CHINA COMMUNICATIONS, 2012, 卷号: 9, 期号: 10, 页码: 91-102
Qin Yu; Zhao Shijun; Zhang Qianying
收藏  |  浏览/下载:12/0  |  提交时间:2013/09/17
threshold ring signature scheme based on tpm 期刊论文
CHINA COMMUNICATIONS, 2012, 卷号: 9, 期号: 1, 页码: 80-85
Bei Gong; Wei Jiang; Li Lin; Yu Li; Xing Zhang
收藏  |  浏览/下载:18/0  |  提交时间:2013/09/17
a provable authenticated certificateless group key agreement with constant rounds 期刊论文
Journal of Communications and Networks, 2012, 卷号: 14, 期号: 1, 页码: 104-110
Teng Jikai; Wu Chuankun
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/17
cryptanalysis of two password authenticated key exchange protocols based on rsa 期刊论文
IEEE COMMUNICATIONS LETTERS, 2006, 卷号: 10, 期号: 8, 页码: 623-625
Cao Tianjie; Lim Dongdai
收藏  |  浏览/下载:12/0  |  提交时间:2011/07/13
cryptanalysis of two password authenticated key exchange protocols based on rsa 期刊论文
IEEE COMMUNICATIONS LETTERS, 2006, 卷号: 10, 期号: 8, 页码: 623-625
Cao Tianjie; Lim Dongdai
收藏  |  浏览/下载:15/0  |  提交时间:2011/07/13
cryptanalysis of two password authenticated key exchange protocols based on rsa 期刊论文
IEEE COMMUNICATIONS LETTERS, 2006, 卷号: 10, 期号: 8, 页码: 623-625
Cao Tianjie; Lim Dongdai
收藏  |  浏览/下载:7/0  |  提交时间:2011/07/13
cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication 期刊论文
IEEE COMMUNICATIONS LETTERS, 2005, 卷号: 9, 期号: 4, 页码: 372-374
Zhou YB; Zhang ZF; Feng DG
收藏  |  浏览/下载:18/0  |  提交时间:2011/07/28


©版权所有 ©2017 CSpace - Powered by CSpace