中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-6 of 6)

Filters    
Items/Page:    Sort:
Authenticated key exchange with entities from different settings and varied groups [期刊论文]
SECURITY AND COMMUNICATION NETWORKS, 2016-01-01, 卷号: 9, 期号: 12, 页码: 1843-1863
Guo, YF; Zhang, ZF

 
Security analysis of a privacy-preserving decentralized ciphertext-policy attribute-based encryption scheme [期刊论文]
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016-01-01, 卷号: 28, 期号: 4, 页码: 1237-1245
Wang, MQ; Zhang, ZF; Chen, C

 
identity based threshold proxy signature [期刊论文]
Chinese Journal of Electronics, 2006-01-01, 卷号: 15, 期号: 1, 页码: 183-186
Xu J; Zhang ZF; Feng Dengguo
  |  
 
cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication [期刊论文]
IEEE COMMUNICATIONS LETTERS, 2005-01-01, 卷号: 9, 期号: 4, 页码: 372-374
Zhou YB; Zhang ZF; Feng DG
  |  
 
cryptanalysis of some signature schemes with message recovery [期刊论文]
Applied Mathematics and Computation, 2005-01-01, 卷号: 170, 期号: 1, 页码: 103-114
Zhang ZF; Feng Dengguo
  |  
 
cryptanalysis of the end-to-end security protocol for mobile communications with end-user identification/authentication [期刊论文]
Ieee Communications Letters, 2005-01-01, 卷号: 9, 期号: 4, 页码: 372-374
Zhou YB; Zhang ZF; Feng Dengguo
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2021  中国科学院软件研究所 - Feedback
Powered by CSpace