×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [8]
武汉大学 [3]
兰州理工大学 [2]
重庆大学 [2]
清华大学 [1]
山东大学 [1]
更多...
内容类型
会议论文 [20]
发表日期
2016 [1]
2012 [1]
2011 [3]
2010 [3]
2009 [1]
2008 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共20条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario
会议论文
作者:
Yu, Fajiang
;
Zhang, Huanguo
;
Zhao, Bo
;
Wang, Juan
;
Zhang, Liqiang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/05
related-mode attacks on pmac
会议论文
2011 International Conference on Instrumentation, Measurement, Circuits and Systems, ICIMCS 2011, Hong Kong, Hong kong, December 12, 2011 - December 13, 2011
Xu Jin
;
Wen Qiaoyan
;
Wang Dayin
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2013/09/22
Authentication
Measurements
Public key cryptography
Security of data
Message broadcast authentication in uTESLA based on double filtering mechanism
会议论文
2011 International Conference on Internet Technology and Applications, iTAP 2011, August 16, 2011 - August 18, 2011
作者:
Hu, Xiangdong
;
Rui, Feng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/31
Improving Security of SET Protocol Based on ECC
会议论文
作者:
Cao, Lai-Cheng
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/15
E-commerce
Authentication
Integrity of data
SET (Secure Electronic Transaction)
ECC (Elliptic Curve Cryptography)
Improving security of SET protocol based on ECC
会议论文
Taiyuan, China, September 24, 2011 - September 25, 2011
作者:
Cao, Lai-Cheng
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Authentication
Data mining
Electronic commerce
Geometry
Information systems
Information use
Public key cryptography
Certificate authority
Credit card transactions
Efficient authentication
Elliptic curve cryptography
Integrity of data
Payment processing
Secure electronic transaction
Standard protocols
A trustworthy email system based on instant messaging
会议论文
Business Information Systems. 10th International Conference, BIS 2007. Proceedings (Lecture Notes in Computer Science Vol.4439), Business Information Systems. 10th International Conference, BIS 2007. Proceedings, Poznan, Poland, INSPEC
Wenmao Zhang
;
Jun Bi
;
Miao Zhang
;
Zheng Qin
收藏
  |  
浏览/下载:3/0
constructing rate-1 macs from related-key unpredictable block ciphers: pgv model revisited
会议论文
17th International Workshop on Fast Software Encryption, Seoul, SOUTH KOREA, FEB 07-10,
Zhang Liting
;
Wu Wenling
;
Wang Peng
;
Zhang Lei
;
Wu Shuang
;
Liang Bo
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2011/03/31
Message Authentication Code
Block Cipher
Mode of Operation
Provable Security
A Key Distribution Scheme Using Network Coding for Mobile Ad hoc Network
会议论文
作者:
Liu, Jianwei
;
Du, Ruiying
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
network coding
key distribution scheme
message authentication code(MAC)
wireless ad hoc network
extended models for message authentication
会议论文
11th International Conference on Information Security and Cryptology, Seoul, SOUTH KOREA, DEC 03-05,
Zhang Liting
;
Wu Wenling
;
Wang Peng
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2011/03/20
Security Model
Message Authentication
Side Channel Attack
Provable Security
a practical certified e-mail system with temporal authentication based on transparent tss
会议论文
9th International Conference on Software Engineering Artificial Intelligence, Networking and Parallel/Distributed Computing, Phuket, THAILAND, AUG 06-08,
Liu Dongmei
;
Qing Sihan
;
Li Pengfei
;
Yuan ChunYang
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2011/06/13
Internet mail system
X.400 message handling system
authentication service
certified e-mail system
generic messaging model
temporal authentication
time stamping server
transparent TSS
authorisation
electronic mail
electronic messaging
©版权所有 ©2017 CSpace - Powered by
CSpace