×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [13]
内容类型
期刊论文 [8]
会议论文 [5]
发表日期
2019 [2]
2017 [3]
2016 [4]
2015 [2]
2014 [1]
2012 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
限定条件
专题:北京航空航天大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 页码: 3511-3528
作者:
Wu, Faguo
;
Yao, Wang
;
Zhang, Xiao
;
Zheng, Zhiming
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
Identity-based signature
Multimedia Social Networks
Revocation
Outsourced computation
Lattice-based
Identity-based proxy signature over NTRU lattice
期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 卷号: 32
作者:
Wu, Faguo
;
Yao, Wang
;
Zhang, Xiao
;
Wang, Wenhua
;
Zheng, Zhiming
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
identity-based
NTRU lattice
proxy signature
quantum computation
Privacy-preserving identity-based file sharing in smart city
期刊论文
PERSONAL AND UBIQUITOUS COMPUTING, 2017, 卷号: 21, 页码: 923-936
作者:
Luo, Xiling
;
Ren, Yili
;
Hu, Jiankun
;
Wu, Qianhong
;
Lou, Jungang
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/30
Smart city
Group signature
Group encryption
Identity based
Knowledge proof
Idology and Its Applications in Public Security and Network Security
会议论文
INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017), 2017-01-01
作者:
Su, Shenghui
;
Zheng, Jianhua
;
Lu, Shuwang
;
Huang, Zhiqiu
;
Li, Zhoujun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Idology
Symmetric identity
Asymmetric identity
Identification
Anti-fraud
Digital signature
Hash function
United verification platform
PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking
期刊论文
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 卷号: 86, 页码: 157-173
作者:
Wang, Mengmeng
;
Liu, Jianwei
;
Chen, Jie
;
Liu, Xiao
;
Mao, Jian
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Software Defined Networking
Flow-rule-validity authentication
Identity-based signature
Flow rule production permissions management
Practical Identity-Based Authentication Protocol for Ad-hoc Networks
会议论文
7th IEEE International Conference on Software Engineering and Service Science (ICSESS), China Hall Sci & Technol, Beijing, PEOPLES R CHINA
作者:
Feng, Boang
;
Liu, Jianwei
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/30
Identity-Based cryptography
ad-hoc
authentication
signature
encryption
Practical Identity-Based Authentication Protocol for Ad-hoc Networks
会议论文
PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016-01-01
作者:
Feng, Boang
;
Liu, Jianwei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Identity-Based cryptography
ad-hoc
authentication
signature
encryption
Identity-based proxy multi-signature applicable to secure E-transaction delegations
期刊论文
High Technology Letters, 2016, 卷号: 22, 页码: 199-206
作者:
Liu, Jianhua
;
Wu, Qianhong
;
Liu, Jianwei
;
Shang, Tao
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2016, 卷号: 65, 页码: 2562-2574
作者:
Zhang, Lei
;
Hu, Chuanyan
;
Wu, Qianhong
;
Domingo-Ferrer, Josep
;
Qin, Bo
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Identity-based signature
security
privacy
vehicular ad hoc networks
A Study of Privacy Improvement Using A Randomized Blind Signature Scheme in Vehicular Networks
会议论文
12th IEEE Int Conf Ubiquitous Intelligence & Comp/12th IEEE Int Conf Autonom & Trusted Comp/15th IEEE Int Conf Scalable Comp & Commun & Associated Workshops/IEEE Int Conf Cloud & Big Data Comp/IEEE Int Conf Internet People, Beijing, PEOPLES R CHINA, 2015-08-10
作者:
Liu Zhe
;
Liu Jianwei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/06
blind signature
identity protection
unlinkability
unforgeability
©版权所有 ©2017 CSpace - Powered by
CSpace