中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-8 of 8)

Items/Page:    Sort:
Analysis and improvement of a provable secure fuzzy identity-based signature scheme [期刊论文]
Science China Information Sciences, 2014-01-01, 卷号: 57, 期号: 9, 页码: 1-5
Xiong, Hu (1); Chen, YaNan (4); Zhu, GuoBin (1); Qin, ZhiGuang (1)

 
对ECC算法实现的选择明文攻击方法 [期刊论文]
通信学报, 2014-01-01, 卷号: 35, 期号: 5, 页码: 79-87
罗鹏; 李慧云; 王鲲鹏; 王亚伟

 
An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments [期刊论文]
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013-01-01, 卷号: 38, 期号: 8, 页码: 2055-2061
He, Debiao; Chen, Yitao; Chen, Jianhua

 
bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round [期刊论文]
IET Information Security, 2010-01-01, 卷号: 4, 期号: 3, 页码: 167-184
Zhao X.; Feng D.
  |  
 
security of the redefined liaws broadcasting cryptosystem [期刊论文]
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2008-01-01, 卷号: 56, 期号: 7, 页码: 1665-1667
Zhu Wen-Tao; Wu Chuan-Lun
  |  
 
基于身份的移动网动态群组密钥协商方案 [期刊论文]
计算机应用, 2006-01-01, 卷号: 26, 期号: 3, 页码: 571-573
邹大毕; 林东岱
  |  
 
identity based threshold proxy signature [期刊论文]
Chinese Journal of Electronics, 2006-01-01, 卷号: 15, 期号: 1, 页码: 183-186
Xu J; Zhang ZF; Feng Dengguo
  |  
 
constructing finite automata with invertibility by transformation method [期刊论文]
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2000-01-01, 卷号: 15, 期号: 1, 页码: 10-26
Tao RJ; Chen SH

 

1

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace