×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [5]
兰州理工大学 [1]
兰州大学 [1]
上海电子信息职业技术... [1]
内容类型
期刊论文 [5]
会议论文 [3]
发表日期
2018 [1]
2017 [1]
2016 [1]
2014 [1]
2013 [1]
2010 [3]
更多...
学科主题
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共8条,第1-8条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A secure and targeted mobile coupon delivery scheme using blockchain
会议论文
作者:
Gu, Yingjie
;
Gui, Xiaolin
;
Xu, Pan
;
Gui, Ruowei
;
Zhao, Yingliang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/19
Analysis and simulation
Behavioral profiles
Data contracts
Encryption algorithms
Non repudiation
Targeted coupon delivery
Transfer of information
Trusted third parties
Cooperative dynamic data possession scheme across a cloud storage environment
期刊论文
Qinghua Daxue Xuebao/Journal of Tsinghua University, 2017, 卷号: 57, 期号: 10, 页码: 1048-1055
作者:
Cao, Laicheng
;
He, Wenwen
;
Liu, Yufei
;
Guo, Xian
;
Feng, Tao
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Digital storage
Network security
Cloud service providers
Cloud storage securities
Cloud storage services
Cooperative dynamics
Dynamic data
Dynamic operations
Integrity verifications
Trusted third parties
HSKAS: A novel hierarchical shared key authentication scheme in wireless sensor networks
期刊论文
International Journal of Security and its Applications, 2016, 卷号: 10, 期号: [db:dc_citation_issue], 页码: 105-116
作者:
Sun, Zeyu
;
Ji, Xiaohui
;
Li, Yuanbo
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/02
Authentication scheme
Communication overheads
Communication radius
Influence of environments
Shared key
Shared key authentication
Trusted third parties
Wireless sensor network (WSNs)
E-marketing under the adverse selection environment: model and case study
期刊论文
International Journal of Networking and Virtual Organisations, 2014, 卷号: Vol.14 No.1-2, 页码: 111-128
作者:
YongPan
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
adverse
selection
qualitative
preference
quality
intermediaries
China
e-commerce
markets
electronic
commerce
e-marketing
electronic
marketing
information
asymmetry
modelling
consumer
preferences
reputation
evaluation
business
alliances
trusted
third
parties
market
quality
experts
cyber
lemons.
An ID-based certified e-mail protocol with STTP suitable for wireless mobile environments
期刊论文
Journal of Computers, 2013, 卷号: 8, 期号: 1, 页码: 3-9
作者:
Wang, Caifen
;
Lan, Caihui
;
Niu, Shufen
;
Cao, Xiaojun
;
Gong, Minan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2016/07/15
Certification process
Certified e-mail
Communication cost
Fair exchange
ID-based
ID-based cryptography
Id-based public key cryptographies
Identity-based signcryption
Public key authentication
Re-encryption
Semi-trusted third parties
Signcryption
Trusted third parties
Wireless mobile environments
An extended strand space method for fairness analysis of non-repudiation protocols
期刊论文
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2010, 卷号: 44, 期号: [db:dc_citation_issue], 页码: 16-20
作者:
Li, Lei
;
Chen, Jing
;
Wang, Yumin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/10
Fairness
Formal analysis method
Non-repudiation protocol
Protocol verification
Signature operation
State-space explosion
Strand space
Trusted third parties
Efficient password-proven key exchange protocol against relay attack on ad hoc networks
会议论文
作者:
Gao, Ang
;
Wei, Wei
;
Shi, Wenbo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/10
Encrypted key exchange
Key exchage
Key exchange protocols
Off-line dictionary attacks
Public-key infrastructure
Relay attack
Secure weakness
Trusted third parties
Hopfield-association: Establishing a shared key in the wireless sensor networks
会议论文
作者:
Gao, Ang
;
Wei, Wei
;
Wang, Zhixiao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/18
Communication overheads
Hostile environments
Key agreement scheme
Security risks
Shared key
Trusted third parties
Wireless sensor network (WSNs)
WSNs
©版权所有 ©2017 CSpace - Powered by
CSpace