中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 15)

Items/Page:    Sort:
efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks [会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Liu Shengli; Weng Jian; Zhao Yunlei

 
accountable authority identity-based encryption with public traceability [会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Lai Junzuo; Deng Robert H.; Zhao Yunlei; Weng Jian

 
generic construction of chosen ciphertext secure proxy re-encryption [会议论文]
12th Cryptographers' Track at the RSA Conference, CT-RSA 2012, San Francisco, CA, United states, February 27, 2012 - March 2, 2012
Hanaoka Goichiro; Kawai Yutaka; Kunihiro Noboru; Matsuda Takahiro; Weng Jian; Zhang Rui; Zhao Yunlei

 
multi-user private keyword search for cloud computing [会议论文]
2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29, 2011 - December 1, 2011
Yang Yanjiang; Lu Haibing; Weng Jian

 
new chosen ciphertext secure public key encryption in the standard model with public verifiability [会议论文]
7th International Conference on Intelligent Computing, ICIC 2011, Zhengzhou, China, August 11,
Weng Zhiwei; Weng Jian; He Kai; Li Yingkai

 
zero-knowledge argument for simultaneous discrete logarithms [期刊论文]
Algorithmica (New York), 2011-01-01, 卷号: 64, 期号: 2, 页码: 1-21
Chow Sherman S.M.; Ma Changshe; Weng Jian

 
generic construction of identity-based strong key-insulated signature [期刊论文]
Journal of Internet Technology, 2011-01-01, 卷号: 12, 期号: 4, 页码: 629-636
Zhou Dehua; Weng Jian; Chen Kefei; Zheng Dong

 
on the security of a bidirectional proxy re-encryption scheme from pkc 2010 [会议论文]
14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, Taormina, Italy, 6-Mar-02
Weng Jian; Zhao Yunlei; Hanaoka Goichiro
  |  
 
cryptanalysis of an identity based broadcast encryption scheme without random oracles [期刊论文]
Information Processing Letters, 2011-01-01, 卷号: 111, 期号: 10, 页码: 461-464
Wang Xu An; Weng Jian; Yang Xiaoyuan; Yang Yanjiang
  |  
 
cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme [期刊论文]
Journal of Systems and Software, 2010-01-01, 卷号: 84, 期号: 2, 页码: -
Wang Xu An; Weng Jian; Yang Xiaoyuan; Zhang Minqing
  |  
 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace