CORC

浏览/检索结果: 共84条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Study on Secret Sharing for SM2 Digital Signature and Its Application 会议论文
14th International Conference on Computational Intelligence and Security (CIS), Hangzhou, PEOPLES R CHINA, NOV 16-19, 2018
作者:  Ding, Fan;  Long, Yihong*;  Wu, Peili
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/04
An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices 会议论文
LECTURE NOTES IN REAL-TIME INTELLIGENT SYSTEMS (RTIS 2016), 2018-01-01
作者:  Liu, Lihua;  Wang, Shangping
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/20
Decentralized Digital Certificate Revocation System Based on Blockchain 会议论文
3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018-01-01
作者:  Zhang, Aisong;  Ma, Xinxin
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
Efficient (k, n) Secret Sharing Scheme Secure Against k-2 Cheaters 会议论文
作者:  Zhu, Lei;  Liu, Yanxiao;  Wang, Yichuan;  Ji, Wenjiang;  Hei, Xinhong
收藏  |  浏览/下载:4/0  |  提交时间:2019/11/26
Efficient (k, n) Secret Sharing Scheme Secure Against k-2 Cheaters 会议论文
2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017-01-01
作者:  Zhu, Lei;  Liu, Yanxiao;  Wang, Yichuan;  Ji, Wenjiang;  Hei, Xinhong
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/20
A verifiable E-voting scheme with secret sharing 会议论文
16th IEEE International Conference on Communication Technology, ICCT 2015
作者:  Yuan L.;  Li M.;  Guo C.;  Hu W.;  Tan X.
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/09
Secure Model based on Multi-cloud for Big Data Storage and Query 会议论文
4th International Conference on Advanced Cloud and Big Data (CBD), 2016-01-01
作者:  Yang, Zhendong[1];  Wang, Liangmin[2];  Song, Xiangmei[3]
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24
A Verifiable E-voting Scheme with Secret Sharing 会议论文
IEEE 16th International Conference on Communication Technology (ICCT), Beijing, PEOPLES R CHINA
作者:  Yuan, Lifeng;  Li, Mingchu;  Guo, Cheng;  Hu, Weitong;  Tan, Xing
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/09
A Group Authentication Scheme Supporting Cheating Detection and Identification 会议论文
Ninth International Conference on Frontier of Computer Science and Technology, Dalian, PEOPLES R CHINA, 2015-08-26
作者:  Guo, Cheng;  Zhuang, Ruhan;  Yuan, Lifeng;  Feng, Bin
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/09
Linear (k, n) secret sharing scheme with cheating detection 会议论文
IEEE International Conference on Computer and Information, Liverpool, UNITED KINGDOM, 2015-10-26
作者:  Liu, Yan-Xiao;  Wang, Zhi-Xiao;  Yan, Wen-Yao
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/20


©版权所有 ©2017 CSpace - Powered by CSpace