中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-3 of 3)

Filters        
Items/Page:    Sort:
bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round [期刊论文]
IET Information Security, 2010-01-01, 卷号: 4, 期号: 3, 页码: 167-184
Zhao X.; Feng D.
  |  
 
analysis of bilinear pairing-based accumulator for identity escrowing [期刊论文]
IET INFORMATION SECURITY, 2008-01-01, 卷号: 2, 期号: 4, 页码: 99-107
Tartary C.; Zhou S.; Lin D.; Wang H.; Pieprzyk J.
  |  
 
colour visual cryptography schemes [期刊论文]
IET INFORMATION SECURITY, 2008-01-01, 卷号: 2, 期号: 4, 页码: 151-165
Liu F.; Wu C. K.; Lin X. J.
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace