CORC

浏览/检索结果: 共25条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Secure and fine-grained electricity consumption aggregation scheme for smart grid 期刊论文
KSII Transactions on Internet and Information Systems, 2018, 卷号: 12, 期号: 4, 页码: 1553-1571
作者:  Shen, Gang;  Su, Yixin*;  Zhang, Danhong
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/04
A Secure Scheme Based on Layer Model in Multi-Phase Sensor Networks 期刊论文
IEEE Communications Letters, 2016, 卷号: Vol.20 No.7, 页码: 1421-1424
作者:  Zhou, Boqing;  Wang, Jianxin;  Li, Sujun;  Wang, Weiping;  Cheng, Yun
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/31
Forward secure dynamic direct anonymous attestation scheme based on dynamic accumulator 期刊论文
Journal of Computational Information Systems, 2014, 卷号: 10, 期号: 16, 页码: 6867-6874
作者:  Feng, Tao;  Wen, Huihui;  Wang, Jing;  Liang, Yixin
收藏  |  浏览/下载:11/0  |  提交时间:2020/11/14
Two-way deterministic quantum key distribution against detector-side-channel attacks 期刊论文
PHYSICAL REVIEW A, 2013, 卷号: 88, 期号: 4
作者:  Lu, Hua;  Fung, Chi-Hang Fred;  Cai, Qing-yu
收藏  |  浏览/下载:19/0  |  提交时间:2015/06/23
A Continuous Secure Scheme in Static Heterogeneous Sensor Networks 期刊论文
IEEE Communications Letters, 2013, 卷号: Vol.17 No.9, 页码: 1868-1871
作者:  Zhou, Boqing;  Wang, Jianxin;  Li, Sujun;  Cheng, Yun;  Wu, Jie
收藏  |  浏览/下载:6/0  |  提交时间:2020/01/05
Secure data retrieval of outsourced data with complex query support 其他
2012-01-01
Zhu, Yan; Ma, Di; Wang, Shanbiao
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
双向安全的群签名方案 期刊论文
Journal of Beijing University of Technology, 2012, 卷号: 38, 期号: 5, 页码: 736-739
周由胜; 辛阳; 卿斯汉; 杨义先
收藏  |  浏览/下载:20/0  |  提交时间:2012/11/12
A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks 期刊论文
IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 卷号: Vol.1 No.5, 页码: 416-419
作者:  Li, Sujun;  Zhou, Boqing;  Dai, Jingguo;  Sun, Xingming
收藏  |  浏览/下载:3/0  |  提交时间:2020/01/05
Provably secure anonymous authentication key agreement protocol for multicast group 期刊论文
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 卷号: 40, 期号: 2, 页码: 273-277
作者:  Feng, Tao;  Liu, Yuan-Yuan;  Ma, Jian-Feng
收藏  |  浏览/下载:7/0  |  提交时间:2020/11/14
collusion attack on a self-healing key distribution with revocation in wireless sensor networks 会议论文
11th International Workshop on Information Security Applications, WISA 2010, Jeju Island, Korea, Republic of, August 24,
Bao Kehua; Zhang Zhenfeng
收藏  |  浏览/下载:9/0  |  提交时间:2011/10/10


©版权所有 ©2017 CSpace - Powered by CSpace