×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [4]
软件研究所 [3]
兰州理工大学 [2]
上海电子信息职业技术... [1]
内容类型
期刊论文 [6]
会议论文 [4]
发表日期
2016 [1]
2010 [5]
2005 [2]
2004 [1]
学科主题
Engineerin... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Secure DNP3 services scheme in smart grid link layer based on GCM-AES
期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: 8, 页码: 131-144
作者:
Lu, Ye
;
Feng, Tao
;
Ma, Guohua
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Automation
Cryptography
Electric power transmission networks
Smart power grids
Structural frames
Authenticated encryption
Authentication encryption
DNP3
GCM-AES
Message authentication protocols
Real time
Security
Substation Automation Systems
Provably secure approach for multiple node-disjoint paths source routing protocol
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2010, 卷号: 21, 期号: 7, 页码: 1717-1731
作者:
Feng, Tao
;
Guo, Xian
;
Ma, Jian-Feng
;
Li, Xing-Hua
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Ad hoc networks
Authentication
Mobile ad hoc networks
Multipath propagation
Network routing
Routing protocols
Topology
Message authentication codes
Multi-path routing schemes
Multipath routing protocols
Multiple nodes
Plausible route
Provably security
Source routing protocols
Universally Composable Security
A trustworthy email system based on instant messaging
会议论文
Business Information Systems. 10th International Conference, BIS 2007. Proceedings (Lecture Notes in Computer Science Vol.4439), Business Information Systems. 10th International Conference, BIS 2007. Proceedings, Poznan, Poland, INSPEC
Wenmao Zhang
;
Jun Bi
;
Miao Zhang
;
Zheng Qin
收藏
  |  
浏览/下载:3/0
A self-encryption authentication protocol for teleconference services
期刊论文
2010, 2010
Yixin Jiang
;
Chuang Lin
;
Minghui Shi
;
Xuemin Sherman Shen
收藏
  |  
浏览/下载:5/0
Framework for secure authentication of nodes in peer-to-peer network
期刊论文
2010, 2010
Zhou Zhou
;
Huang Yongfeng
;
Li Xing
收藏
  |  
浏览/下载:3/0
Analysis and improvements of the IKEv2 protocol
期刊论文
2010, 2010
Zhang Chaodong
;
Xu Mingwei
收藏
  |  
浏览/下载:8/0
an efficient id-based deniable authentication protocol from pairings
会议论文
19th International Conference on Advanced Information Networking and Applications, Taipei, TAIWAN, MAR 28-30,
Cao TJ
;
Lin DD
;
Xue R
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2011/07/28
ID-based deniable authentication protocol
data privacy
data privacy
message authentication
protocols
efficient identity-based multicast scheme from bilinear pairing
期刊论文
IEE PROCEEDINGS-COMMUNICATIONS, 2005, 卷号: 152, 期号: 6, 页码: 877-882
Wang L
;
Wu CK
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2011/07/28
backward secrecy
bilinear pairing
data integrity service
dynamic group key management
efficient identity-based multicast scheme
forward secrecy
multicast communication system
source authentication
cryptography
data integrity
message authentication
multicast protocols
telecommunication security
a new cembs based on rsa signatures and its application in constructing fair exchange protocol
会议论文
IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE 2004), Taipei, TAIWAN, MAR 28-31,
Zhou YB
;
Zhang ZF
;
Qing SH
;
Liu J
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2011/07/29
RSA signatures
cryptographic primitive
digital signature
e-commerce protocols
encryption scheme
fair exchange protocol
security analysis
cryptography
electronic commerce
message authentication
Enabling information push for network- and device-agnostic internet services
会议论文
2011
作者:
Uchida,Naoki
;
Yamada,Junnosuke
;
Magedanz,Thomas
;
Blum,Niklas
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2020/01/04
Authentication
Message
service
Protocols
Portals
Electronic
mail
Mobile
handsets
Push
services
Distributed
information
systems
Multi-access
communication
©版权所有 ©2017 CSpace - Powered by
CSpace