|
已选(0)清除
条数/页: 排序方式: |
| efficient monitoring of skyline queries over distributed data streams 期刊论文 KNOWLEDGE AND INFORMATION SYSTEMS, 2010, 卷号: 25, 期号: 3, 页码: 575-606 作者: Sun Shengli; Huang Zhenghua; Zhong Hao; Dai Dongbo; Liu Hongbin; Li Jinjiu
Adobe PDF(2021Kb)  |   收藏  |  浏览/下载:41/0  |  提交时间:2011/05/23 Distributed Data StreamsSkylineCommunication-optimal ProcessingProgressive Refinement |
| chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings 期刊论文 Information Sciences, 2010, 卷号: 180, 期号: 24, 页码: 5077-5089 作者: Weng Jian; Deng Robert H.; Liu Shengli; Chen Kefei
 收藏  |  浏览/下载:37/0  |  提交时间:2011/05/23 Network Security |
| bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round 期刊论文 IET Information Security, 2010, 卷号: 4, 期号: 3, 页码: 167-184 作者: Zhao X.; Feng D.
Adobe PDF(659Kb)  |   收藏  |  浏览/下载:44/0  |  提交时间:2011/05/23 Multivariate Public Key CryptosystemQuadratic RoundsSecurity ImprovementTwo-round SchemePublic Key Cryptography |
| 2-adic complexity of binary m-sequences 期刊论文 IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 卷号: 56, 期号: 1, 页码: 450-454 作者: Tian Tian; Qi Wen-Feng
Adobe PDF(142Kb)  |   收藏  |  浏览/下载:35/0  |  提交时间:2011/05/24 2-adic ComplexityFeedback With Carry Shift Register (Fcsr) SequencesM-sequences |
| distribution properties of compressing sequences derived from primitive sequences over z/(p(e)) 期刊论文 IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 卷号: 56, 期号: 1, 页码: 555-563 作者: Zheng Qun-Xiong; Qi Wen-Feng
Adobe PDF(251Kb)  |   收藏  |  浏览/下载:32/0  |  提交时间:2011/05/23 S-uniformityCompressing MapInteger Residue RingLinear Recurring SequencePrimitive Sequence |
| security model and modular design of fair authentication key exchange protocols 期刊论文 SCIENCE CHINA-INFORMATION SCIENCES, 2010, 卷号: 53, 期号: 2, 页码: 278-287 作者: Feng DengGuo; Chen WeiDong
Adobe PDF(196Kb)  |   收藏  |  浏览/下载:36/0  |  提交时间:2011/05/23 Authentication Key Exchange ProtocolsDeniabilityFairnessConcurrent SignatureProvable Security |
| on constant-round zero-knowledge proofs of knowledge for np-relations 期刊论文 SCIENCE CHINA-INFORMATION SCIENCES, 2010, 卷号: 53, 期号: 4, 页码: 788-799 作者: Li HongDa; Xu HaiXia; Li Bao; Feng DengGuo
Adobe PDF(237Kb)  |   收藏  |  浏览/下载:44/0  |  提交时间:2011/05/23 Zero-knowledge ProofProOf Of KnowledgeConstant-roundNp-relation |
| a property-based attestation protocol for tcm 期刊论文 SCIENCE CHINA-INFORMATION SCIENCES, 2010, 卷号: 53, 期号: 3, 页码: 454-464 作者: Feng DengGuo; Qin Yu
Adobe PDF(254Kb)  |   收藏  |  浏览/下载:43/0  |  提交时间:2011/05/23 Trust ComputingTrust Cryptographic Module (Tcm)Property AttestationSignature Of KnowledgeConfiguration Commitment |
| dynamic tree-based authenticated group key exchange protocol 期刊论文 SCIENCE CHINA-INFORMATION SCIENCES, 2010, 卷号: 53, 期号: 8, 页码: 1591-1602 作者: Li Hui; Wu ChuanKun; Teng Jikai
Adobe PDF(284Kb)  |   收藏  |  浏览/下载:55/0  |  提交时间:2011/05/23 Tree-basedGroup Key ExchangeDynamicProvable Security |
| new disturbance vector for sha-0 collision 期刊论文 JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 卷号: 26, 期号: 6, 页码: 2143-2157 作者: Wu Shuang; Feng Deng-Guo; Wu Wen-Ling
Adobe PDF(548Kb)  |   收藏  |  浏览/下载:47/0  |  提交时间:2011/05/23 Hash FunctionCollision Search AttackDisturbance VectorDifferential PathMessage ModificationSha-0 |