×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [2]
北京大学 [2]
上海大学 [2]
武汉大学 [2]
软件研究所 [2]
西安交通大学 [1]
更多...
内容类型
期刊论文 [11]
会议论文 [3]
其他 [2]
发表日期
2017 [3]
2013 [1]
2012 [3]
2011 [3]
2010 [2]
2006 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共16条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
On emerging family of elliptic curves to secure internet of things: ECC comes of age
期刊论文
IEEE Transactions on Dependable and Secure Computing, 2017, 卷号: 14, 期号: 3, 页码: 237-248
作者:
Liu, Zhe*
;
Huang, Xinyi
;
Hu, Zhi
;
Khan, Muhammad Khurram
;
Seo, Hwajeong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/03
Internet of things
MICAz node
tmote sky node
resource-constraint microcontrollers
key exchange scheme
signature scheme
Simple Method for Realizing Weil Theorem in Secure ECC Generation
期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 卷号: 22, 页码: 511-519
作者:
Hu, Feng[1]
;
Wang, Chao[2]
;
Zhang, Huanguo[3]
;
Wu, Jie[4]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/24
Elliptic Curves (ECs)
Pascal's triangle
Weil theorem
Simple Method for Realizing Weil Theorem in Secure ECC Generation
期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 卷号: 22, 期号: 5
作者:
Hu, Feng
;
Wang, Chao
;
Zhang, Huanguo
;
Wu, Jie
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Elliptic Curves (ECs)
Pascal's triangle
Weil theorem
Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings
其他
2013-01-01
Qi Yanfeng
;
Tang Chunming
;
Lou Yu
;
Xu Maozhi
;
Guo Baoan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2015/11/13
certificateless signcryption
identity-based cryptography
proxy signcryption
elliptic curve discrete logarithm problem
PUBLIC-KEY ENCRYPTION
CRYPTOGRAPHY
SECURITY
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2012
作者:
Keke Wu
;
Huiyun Li
;
Dingju Zhu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2015/08/25
Isomorphism classes of Jacobi quartic curve over finite fields
其他
2012-01-01
Wu, Hongfeng
;
Feng, Rongquan
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2015/11/17
a new efficient property-based attestation protocol based on elliptic curves
会议论文
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chu Xiaobo
;
Yu Qin
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2013/09/22
Network security
Ubiquitous computing
an efficient pba protocol based on elliptic curves
会议论文
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Chu Xiaobo
;
Qin Yu
;
Feng Dengguo
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2011/10/10
Communication
Distributed computer systems
Koblitz Elliptic Curves Generating Based on Evolutionary Cryptography Theory and Verifying Parameters Recommended by NIST
期刊论文
CHINA COMMUNICATIONS, 2011, 卷号: 8, 页码: 41-49
作者:
Wang Chao[1]
;
Zhang Huanguo[2]
;
Liu Lili[3]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/30
evolutionary cryptography
ECC
secure curves
ACO
Koblitz Elliptic Curves Generating Based on Evolutionary Cryptography Theory and Verifying Parameters Recommended by NIST
期刊论文
CHINA COMMUNICATIONS, 2011, 卷号: 8, 期号: 4
作者:
Wang Chao
;
Zhang Huanguo
;
Liu Lili
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
evolutionary cryptography
ECC
secure curves
ACO
©版权所有 ©2017 CSpace - Powered by
CSpace