CORC

浏览/检索结果: 共23条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure 会议论文
10th International Conference on Provable Security (ProvSec), Nanjing, PEOPLES R CHINA, 2016-11-10
作者:  Zhang, Jianhong;  Li, Pengyan;  Sun, Zhibin;  Mao, Jian
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
Provably secure RSA-based remote user authentication protocol using passwords 期刊论文
xitong gongcheng lilun yu shijiansystem engineering theory and practice, 2015
Wang, Ding; Wang, Ping; Li, Zeng-Peng; Ma, Chun-Guang
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
Finding shortest lattice vectors in the presence of gaps 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 卷号: 9048, 页码: 239-257
作者:  Wei, Wei;  Liu, Mingjie;  Wang, Xiaoyun
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/17
Identity-Based Encryption on RSA Without Pairings and Key Escrow 其他
2014-01-01
Zhu Yan; Wang Shanbiao; Ma Di; Feng Rongquan
收藏  |  浏览/下载:4/0  |  提交时间:2015/11/16
基于REESSE1+公钥密码体制的概率加密 其他
2014-01-01
孙国栋; 苏盛辉; 徐茂智
收藏  |  浏览/下载:10/0  |  提交时间:2015/11/11
Research on optimization of conformal polishing using continuous precession 期刊论文
http://dx.doi.org/10.1007/s00170-014-6626-5, 2014
Pan, Ri; Zhang, Yajun; Ding, Jianbiao; Wang, Zhenzhong; Guo, Yinbiao; 王振忠; 郭隐彪
收藏  |  浏览/下载:4/0  |  提交时间:2015/07/22
基于流水线技术的并行模幂算法硬件实现 期刊论文
2013
黄世伟; 王云峰
收藏  |  浏览/下载:3/0  |  提交时间:2016/05/17
面向频谱融合的路由频谱分配和碎片整理算法 期刊论文
光子学报, 2013
鞠卫国; 黄善国; 徐珍珍; 郭秉礼; 赵永利; 张杰; 顾畹仪
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/12
车联网信息安全SOC设计与应用开发 学位论文
2013, 2013
黄世伟
收藏  |  浏览/下载:3/0  |  提交时间:2016/01/13
accountable authority identity-based encryption with public traceability 会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Lai Junzuo; Deng Robert H.; Zhao Yunlei; Weng Jian
收藏  |  浏览/下载:11/0  |  提交时间:2013/09/22


©版权所有 ©2017 CSpace - Powered by CSpace