CORC

浏览/检索结果: 共68条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Linear space-variant optical cryptosystem via Fourier ptychography 会议论文
San Francisco, CA, United states, 2019-02-02
作者:  Pan, An;  Wen, Kai;  Yao, Baoli
收藏  |  浏览/下载:45/0  |  提交时间:2019/07/08
Parallel DNA Computing Model of Point-Doubling in Conic Curves Cryptosystem over Finite Field GF(2n) 会议论文
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, 2019-08-10
作者:  Li, Yongnan;  Xiao, Limin
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/30
Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage 会议论文
2017 14TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS AND NETWORKS & 2017 11TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY & 2017 THIRD INTERNATIONAL SYMPOSIUM OF CREATIVE COMPUTING (ISPAN-FCST-ISCC), 2017-01-01
作者:  Guo, Cheng;  Luo, Ningqi;  Jie, Yingmo;  Bhuiyan, Md Zakirul Alam;  Chen, Yuanfang
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/02
Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage 会议论文
ISPAN-FCST-ISCC 2017
作者:  Guo C(郭成)
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/03
Privacy-preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control 会议论文
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, AUG 01-04, 2017
作者:  Liu, Meng;  Zhang, Xuyun;  Yang, Chi;  Pang, Shaoning;  Puthal, Deepak
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/31
A Schnorr Multiple Digital Signatures Based on the Hyperelliptic Curve Cryptosystem 会议论文
Nanjing, PEOPLES R CHINA, JUN 19-20, 2015
作者:  Qiu, Gege;  Wang, Xueming;  Zhang, Yansheng
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/02
A fresh Two-party Authentication Key Exchange Protocol for Mobile Environment 会议论文
作者:  Yang, H. B.;  Chen, J. H.;  Zhang, Y. Y.
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/05
Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data 会议论文
10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015, Singapore, Singapore, 2015-04-14
作者:  Deng, Hua;  Wu, Qianhong;  Qin, Bo;  Susilo, Willy;  Liu, Joseph
收藏  |  浏览/下载:1/0  |  提交时间:2020/01/06
Threshold Attribute-Based Signcryption in Standard Model 会议论文
2nd International Conference on Cyber Security and Cloud Computing (CS Cloud), New York, NY, 2015-01-01
作者:  Zheng, Haibin;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
Threshold Attribute-Based Signcryption in Standard Model 会议论文
2nd International Conference on Cyber Security and Cloud Computing (CS Cloud), NOV 03-05, 2015
作者:  Zheng, Haibin;  Qin, Jing;  Hu, Jiankun;  Wu, Qianhong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/31


©版权所有 ©2017 CSpace - Powered by CSpace