×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
安徽大学 [50]
内容类型
期刊论文 [50]
发表日期
2017 [1]
2016 [3]
2015 [2]
2014 [4]
2013 [2]
2012 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共50条,第1-10条
帮助
限定条件
专题:安徽大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Two new families of two-weight codes*
期刊论文
IEEE Transactions on Information Theory, 2017, 卷号: Vol.63 No.10, 页码: 6240-6246
作者:
Minjia Shi
;
Patrick Solé
;
Yue Guan
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/04/22
Frequency
modulation
Cryptography
Indexes
Mobile
communication
Hamming
weight
Linear
codes
Two-weight
codes
Gauss
sums
Griesmer
bound
Secret
sharing
schemes
Security Secret Information Hiding Based on Hash Function and Invisible ASCII Characters Replacement
期刊论文
2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, 页码: 1963-1969
作者:
Liu,Feng
;
Zhu,Erzhou
;
Zhang,Cheng
;
Zhang,Yiwen
;
Ma,Zhujuan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/04/22
Text-based
information
hiding
Invisible
character
replacement
Hash
function
Information
security
An integratable verifiable secret sharing mechanism
期刊论文
International Journal of Network Security, 2016, 卷号: Vol.18 No.4, 页码: 617-624
作者:
Chang,Chin-Chen
;
Liu,Yanjun
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/04/22
Multiparty semiquantum secret sharing based on rearranging orders of qubits
期刊论文
MODERN PHYSICS LETTERS B, MODERN PHYSICS LETTERS B, 2016, 卷号: Vol.30 No.10
作者:
Gao,Gan
;
Wang,Yue
;
Wang,Dong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/24
QUANTUM KEY DISTRIBUTION
GROVER ALGORITHM
BELL STATES
ENTANGLEMENT
INFORMATION
PROTOCOL
SCHEME
PHOTONS
Study of a secret information transmission scheme based on invisible ASCII characters
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 卷号: Vol.9141, 页码: 144-150
作者:
Li,Yuchan
;
Hong,Xing
;
Zhu,Erzhou
;
Cui,Guangming
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/22
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
期刊论文
International Journal of Communication Systems, 2015, 卷号: Vol.28 No.7, 页码: 1282-1292
作者:
Lein Harn
;
Yanjun Liu
;
Chin-Chen Chang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/22
Chinese
Remainder
Theorem
modified
t-threshold
range
secret
sharing
t-threshold
consistency
verifiable
secret
sharing
Full secure secret sharing scheme with changeable access structure from linear code
期刊论文
2014 International Conference on Information and Communications Technologies, ICT 2014, 2014
作者:
Xu,Yan
;
Meng,Li-Xia
;
Cui,Jie
;
Liu,Hui
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/22
An authenticated group key distribution mechanism using theory of numbers
期刊论文
International Journal of Communication Systems, 2014, 卷号: Vol.27 No.11, 页码: 3502-3512
作者:
Lein Harn
;
Yanjun Liu
;
Chin-Chen Chang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/22
group
key
distribution
Chinese
remainder
theorem
secret
sharing
t-threshold
range
Tripartite quantum operation sharing with two asymmetric three-qubit W states in five entanglement structures
期刊论文
Quantum Information Processing, 2014, 卷号: Vol.13 No.8, 页码: 1659-1676
作者:
Xie,Chuanmei
;
Ji,Qibin
;
Zhang,Zhanjun
;
Yin,Xiaofeng
;
Liu,Yimin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/22
SECURE DIRECT COMMUNICATION
PODOLSKY-ROSEN CHANNELS
PERFECT TELEPORTATION
SINGLE PHOTONS
SECRET
MULTIPARTY
INFORMATION
A Fast and Secure Scheme for Data Outsourcing in the Cloud
期刊论文
KSII Transactions on Internet and Information Systems(TIIS), 2014, 卷号: Vol.8 No.8, 页码: 2708-2721
作者:
Chang,Chin-Chen
;
Liu,Yanjun
;
Wu,Hsiao-Ling
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/24
SECRET
SHARE
©版权所有 ©2017 CSpace - Powered by
CSpace