ISCAS OpenIR

浏览/检索结果: 共79条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
efficient monitoring of skyline queries over distributed data streams 期刊论文
KNOWLEDGE AND INFORMATION SYSTEMS, 2010, 卷号: 25, 期号: 3, 页码: 575-606
作者:  Sun Shengli;  Huang Zhenghua;  Zhong Hao;  Dai Dongbo;  Liu Hongbin;  Li Jinjiu
Adobe PDF(2021Kb)  |  收藏  |  浏览/下载:41/0  |  提交时间:2011/05/23
Distributed Data StreamsSkylineCommunication-optimal ProcessingProgressive Refinement
chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings 期刊论文
Information Sciences, 2010, 卷号: 180, 期号: 24, 页码: 5077-5089
作者:  Weng Jian;  Deng Robert H.;  Liu Shengli;  Chen Kefei
收藏  |  浏览/下载:37/0  |  提交时间:2011/05/23
Network Security
bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round 期刊论文
IET Information Security, 2010, 卷号: 4, 期号: 3, 页码: 167-184
作者:  Zhao X.;  Feng D.
Adobe PDF(659Kb)  |  收藏  |  浏览/下载:44/0  |  提交时间:2011/05/23
Multivariate Public Key CryptosystemQuadratic RoundsSecurity ImprovementTwo-round SchemePublic Key Cryptography
2-adic complexity of binary m-sequences 期刊论文
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 卷号: 56, 期号: 1, 页码: 450-454
作者:  Tian Tian;  Qi Wen-Feng
Adobe PDF(142Kb)  |  收藏  |  浏览/下载:35/0  |  提交时间:2011/05/24
2-adic ComplexityFeedback With Carry Shift Register (Fcsr) SequencesM-sequences
distribution properties of compressing sequences derived from primitive sequences over z/(p(e)) 期刊论文
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 卷号: 56, 期号: 1, 页码: 555-563
作者:  Zheng Qun-Xiong;  Qi Wen-Feng
Adobe PDF(251Kb)  |  收藏  |  浏览/下载:32/0  |  提交时间:2011/05/23
S-uniformityCompressing MapInteger Residue RingLinear Recurring SequencePrimitive Sequence
security model and modular design of fair authentication key exchange protocols 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2010, 卷号: 53, 期号: 2, 页码: 278-287
作者:  Feng DengGuo;  Chen WeiDong
Adobe PDF(196Kb)  |  收藏  |  浏览/下载:36/0  |  提交时间:2011/05/23
Authentication Key Exchange ProtocolsDeniabilityFairnessConcurrent SignatureProvable Security
on constant-round zero-knowledge proofs of knowledge for np-relations 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2010, 卷号: 53, 期号: 4, 页码: 788-799
作者:  Li HongDa;  Xu HaiXia;  Li Bao;  Feng DengGuo
Adobe PDF(237Kb)  |  收藏  |  浏览/下载:44/0  |  提交时间:2011/05/23
Zero-knowledge ProofProOf Of KnowledgeConstant-roundNp-relation
a property-based attestation protocol for tcm 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2010, 卷号: 53, 期号: 3, 页码: 454-464
作者:  Feng DengGuo;  Qin Yu
Adobe PDF(254Kb)  |  收藏  |  浏览/下载:43/0  |  提交时间:2011/05/23
Trust ComputingTrust Cryptographic Module (Tcm)Property AttestationSignature Of KnowledgeConfiguration Commitment
dynamic tree-based authenticated group key exchange protocol 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2010, 卷号: 53, 期号: 8, 页码: 1591-1602
作者:  Li Hui;  Wu ChuanKun;  Teng Jikai
Adobe PDF(284Kb)  |  收藏  |  浏览/下载:55/0  |  提交时间:2011/05/23
Tree-basedGroup Key ExchangeDynamicProvable Security
new disturbance vector for sha-0 collision 期刊论文
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 卷号: 26, 期号: 6, 页码: 2143-2157
作者:  Wu Shuang;  Feng Deng-Guo;  Wu Wen-Ling
Adobe PDF(548Kb)  |  收藏  |  浏览/下载:47/0  |  提交时间:2011/05/23
Hash FunctionCollision Search AttackDisturbance VectorDifferential PathMessage ModificationSha-0