×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [11]
内容类型
期刊论文 [8]
会议论文 [3]
发表日期
2012 [1]
2011 [3]
2010 [3]
2009 [1]
2008 [3]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Provably secure certificate less blind proxy re-signatures
期刊论文
Tongxin Xuebao/Journal on Communications, 2012, 卷号: 33, 期号: SUPPL.1, 页码: 58-69+78
作者:
Feng, Tao
;
Y.-X., Liang
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Network security
Bilinear map
Blind signature scheme
Blind signatures
Certificate-based
Certificateless cryptographies
Proxy re-signatures
Security properties
Signature Scheme
An efficient and provably secure multi-path Distance Vector Routing
期刊论文
Journal of Computational Information Systems, 2011, 卷号: 7, 期号: 5, 页码: 1638-1647
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhanting
;
Ma, Jianfeng
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Ad hoc networks
Algorithms
Mobile ad hoc networks
Mobile telecommunication systems
Routing protocols
Acknowledgement mechanism
Ad hoc on demand distance vector
Digital Signature
Distance vector routing
Error checks
Mathematical method
Mobile ad hoc
Multi-path
Multiple-path
Network configuration
Node-disjoint paths
Provably secure
Secure routing
Security requirements
Trusted systems
Provably secure anonymous authentication key agreement protocol for multicast group
期刊论文
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 卷号: 40, 期号: 2, 页码: 273-277
作者:
Feng, Tao
;
Liu, Yuan-Yuan
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Authentication
Group technology
Network protocols
Public key cryptography
Anonymity
Anonymous authentication
Anonymous groups
Computation complexity
Forward security
Key agreement
Multicast groups
Provably secure
Provably secure identity based signature without trusted PKG in the standard model
会议论文
作者:
Peng, Wei
;
Feng, Tao
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/15
Computer science
Computers
CDH problem
Chosen message attacks
Diffie-Hellman assumption
ID based signature
ID based signature scheme
Identity based signature
Key escrow
Standard model
Provably secure approach for multiple node-disjoint paths source routing protocol
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2010, 卷号: 21, 期号: 7, 页码: 1717-1731
作者:
Feng, Tao
;
Guo, Xian
;
Ma, Jian-Feng
;
Li, Xing-Hua
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Ad hoc networks
Authentication
Mobile ad hoc networks
Multipath propagation
Network routing
Routing protocols
Topology
Message authentication codes
Multi-path routing schemes
Multipath routing protocols
Multiple nodes
Plausible route
Provably security
Source routing protocols
Universally Composable Security
The hierarchical threat model of routing security for wireless ad hoc networks
会议论文
作者:
Xian, Guo
;
Tao, Feng
;
Yuan, Zhan-Ting
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/11/15
Ad hoc networks
Distributed computer systems
Network routing
Attacker models
Communication capabilities
Communication path
Dolev-Yao threat model
Provable security
Routing security
Security analysis
Threat modeling
Provably secure partially blind signature without trusted PKG
期刊论文
Tongxin Xuebao/Journal on Communications, 2010, 卷号: 31, 期号: 1, 页码: 128-134
作者:
Feng, Tao
;
Peng, Wei
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Public key cryptography
Bilinear pairing
Computational diffie-hellman problems
Gap Diffie-Hellman groups
ID based signature
Key escrow
Partially blind signature scheme
Partially blind signatures
Private key generators
Multiple node-disjoint paths secure source routing for MANET
期刊论文
Jisuanji Xuebao/Chinese Journal of Computers, 2009, 卷号: 32, 期号: 6, 页码: 1126-1133
作者:
Feng, Tao
;
Guo, Xian
;
Ma, Jian-Feng
;
Li, Xing-Hua
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/14
Authentication
Mobile ad hoc networks
MANET
MNDP
Plausible route
Provably secure
SMNDP
The universally composable security authentication and key exchange protocol for mobile satellite communication systems
期刊论文
Yuhang Xuebao/Journal of Astronautics, 2008, 卷号: 29, 期号: 6, 页码: 1959-1964
作者:
Feng, Tao
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/11/14
Authentication
Cryptography
Flowcharting
Network security
Satellites
Authentication and key exchange
Forward-secure
Mobile satellite communication system (MSCS)
Mobile satellite communication systems
Network control centers
Pseudo-random functions
Universally composable
Universally Composable Security
New approach against Sybil attack in wireless sensor networks
期刊论文
Tongxin Xuebao/Journal on Communications, 2008, 卷号: 29, 期号: 6, 页码: 13-19
作者:
Feng, Tao
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/11/14
Sensor networks
Sensor nodes
Active adversary
Authentication and key exchange protocols
Comprehensive performance
One-way accumulators
Secret information
Sensor network applications
Sybil attack
Universally composable
©版权所有 ©2017 CSpace - Powered by
CSpace