CORC

浏览/检索结果: 共48条,第1-10条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
ExBLACR: Extending BLACR system 会议论文
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Wang, Weijin (1); Feng, Dengguo (1); Qin, Yu (1); Shao, Jianxiong (1); Xi, Li (1); Chu, Xiaobo (1)
收藏  |  浏览/下载:54/0  |  提交时间:2014/12/16
Automated proof for authorization protocols of TPM 2.0 in computational model 会议论文
10th International Conference on Information Security Practice and Experience, ISPEC 2014, Fuzhou, China, May 5, 2014 - May 8, 2014
Wang, Weijin (1); Qin, Yu (1); Feng, Dengguo (1)
收藏  |  浏览/下载:17/0  |  提交时间:2014/12/16
Cryptanalysis of Helix and Phelix revisited 会议论文
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1); Zhang, Bin (2); Feng, Dengguo (1)
收藏  |  浏览/下载:16/0  |  提交时间:2014/12/16
Leaked-state-forgery attack against the authenticated encryption algorithm ALE 会议论文
19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013, Bengaluru, India, December 1, 2013 - December 5, 2013
Wu, Shengbao (1); Wu, Hongjun (2); Huang, Tao (2); Wang, Mingsheng (4); Wu, Wenling (1)
收藏  |  浏览/下载:10/0  |  提交时间:2014/12/16
boomerang and slide-rotational analysis of the sm3 hash function 会议论文
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Kircanski Aleksandar; Shen Yanzhao; Wang Gaoli; Youssef Amr M.
收藏  |  浏览/下载:8/0  |  提交时间:2013/09/22
quality-optimized authentication of scalable media streams with flexible transcoding over wireless networks 会议论文
2012 3rd FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing, MUSIC 2012, Vancouver, BC, Canada, June 26, 2012 - June 28, 2012
Yi Xiaowei; Li Mingyu; Zheng Gang; Zheng Changwen
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22
cryptanalysis of an efficient three-party key exchange protocol 会议论文
2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19, 2012 - September 21, 2012
Fu Xiaotong; Shi Ruijun
收藏  |  浏览/下载:10/0  |  提交时间:2013/09/22
an identity-based authentication scheme in cloud computing 会议论文
2012 International Conference on Industrial Control and Electronics Engineering, ICICEE 2012, Xi'an, China, August 23, 2012 - August 25, 2012
Zhang Zhi-Hua; Jiang Xue-Feng; Li Jian-Jun; Jiang Wei
收藏  |  浏览/下载:15/0  |  提交时间:2013/09/22
toward real-life implementation of signature schemes from the strong rsa assumption 会议论文
15th International Conference on Financial Cryptography and Data Security, FC 2011, St. Lucia, QLD, Australia, February 28, 2011 - March 4, 2011
Yu Ping; Xue Rui
收藏  |  浏览/下载:11/0  |  提交时间:2013/09/22
an new anonymous authentication scheme for cloud computing 会议论文
2012 7th International Conference on Computer Science and Education, ICCSE 2012, Melbourne, VIC, Australia, July 14, 2012 - July 17, 2012
Zhang Zhi-Hua; Li Jian-Jun; Jiang Wei; Zhao Yong; Gong Bei
收藏  |  浏览/下载:12/0  |  提交时间:2013/09/22


©版权所有 ©2017 CSpace - Powered by CSpace