×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [4]
山东大学 [3]
西安理工大学 [2]
北京大学 [1]
安徽大学 [1]
武汉大学 [1]
更多...
内容类型
期刊论文 [10]
会议论文 [2]
其他 [1]
发表日期
2019 [2]
2016 [2]
2013 [1]
2012 [2]
2011 [3]
2010 [1]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A provably secure certificateless public key encryption with keyword search
期刊论文
JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 卷号: 42, 期号: 1, 页码: 20-28
作者:
Wu, Tsu-Yang
;
Chen, Chien-Ming
;
Wang, King-Hang
;
Meng, Chao
;
Wang, Eric Ke
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/11
PEKS
certificateless
off-line keyword guessing attacks
provably
secure
Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Enviroinments
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 49232-49239
作者:
Wu, Tsu-Yang
;
Chen, Chien-Ming
;
Wang, King-Hang
;
Wu, Jimmy Ming-Tai
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/11
IIoT
searchable public key encryption
certificateless
data storage
provably secure
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
期刊论文
IET Communications, 2016, 卷号: Vol.10 No.14, 页码: 1795-1802
作者:
He,Debiao
;
Khan,Muhammad Khurram
;
Wang,Huaqun
;
Wang,Lina
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/22
SENSOR NETWORKS
PROVABLY SECURE
PROTOCOL
AUTHENTICATION
Cryptanalysis of a certificateless aggregate signature scheme with efficient verification
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 期号: 13
作者:
Chen, Jianhua
;
Shen, Han
;
Shen, Jian
;
He, Debiao
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
aggregation signature
certificateless
attack
provably secure
A Key-Policy Attribute-Based Broadcast Encryption
期刊论文
2013, 卷号: 10, 页码: 444-452
作者:
Sun, Jin
;
Hu, Yupu
;
Zhang, Leyou
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/20
Attribute-based encryption
broadcast encryption
dual system
KP-ABBE
provably secure
an id-based authenticated dynamic group key agreement with optimal round
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 11, 页码: 2542-2554
Teng JiKai
;
Wu ChuanKun
;
Tang ChunMing
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2013/09/17
identity-based cryptography
dynamic group key agreement
provably secure
admissible pairing
Fully Secure Broadcast Encryption for Inner-Product Predicates
会议论文
International Workshop on Information and Electronics Engineering (IWIEE) / International Conference on Information, Computing and Telecommunications (ICICT), Harbin, PEOPLES R CHINA, 2012-03-10
作者:
Sun, Jin
;
Hu, Yu-Pu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/20
broadcast encryption
full security
inner-product predicate encryption
provably secure
An efficient and provably secure multi-path Distance Vector Routing
期刊论文
Journal of Computational Information Systems, 2011, 卷号: 7, 期号: 5, 页码: 1638-1647
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhanting
;
Ma, Jianfeng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Ad hoc networks
Algorithms
Mobile ad hoc networks
Mobile telecommunication systems
Routing protocols
Acknowledgement mechanism
Ad hoc on demand distance vector
Digital Signature
Distance vector routing
Error checks
Mathematical method
Mobile ad hoc
Multi-path
Multiple-path
Network configuration
Node-disjoint paths
Provably secure
Secure routing
Security requirements
Trusted systems
Provably secure anonymous authentication key agreement protocol for multicast group
期刊论文
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 卷号: 40, 期号: 2, 页码: 273-277
作者:
Feng, Tao
;
Liu, Yuan-Yuan
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Authentication
Group technology
Network protocols
Public key cryptography
Anonymity
Anonymous authentication
Anonymous groups
Computation complexity
Forward security
Key agreement
Multicast groups
Provably secure
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications
其他
2011-01-01
Chen, Yu
;
Chen, Liqun
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/13
bilinear Diffie-Hellman inversion problem
twin bilinear Diffie-Hellman inversion problem
trapdoor test
identity-based encryption
identity-based key encapsulation
IDENTITY-BASED ENCRYPTION
CHOSEN CIPHERTEXT ATTACK
PROVABLY-SECURE
RANDOM ORACLES
SIGNATURES
EFFICIENT
SCHEME
PROOF
IBE
©版权所有 ©2017 CSpace - Powered by
CSpace