×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [6]
中国科学院大学 [3]
北京航空航天大学 [2]
山东大学 [2]
厦门大学 [1]
北京大学 [1]
更多...
内容类型
期刊论文 [16]
会议论文 [3]
学位论文 [1]
发表日期
2019 [1]
2016 [1]
2014 [1]
2013 [4]
2012 [2]
2011 [4]
更多...
学科主题
Biochemist... [1]
Computer S... [1]
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共20条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 页码: 878-890
作者:
Zhang, Jie
;
Huang, Xin
;
Wang, Wei
;
Yue, Yong
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/11/19
Authenticated key exchange (AKE)
unbalanced computational requirements
identity-based (ID-based) cryptography
disaster scenarios
pairing-free
Authenticated key exchange with entities from different settings and varied groups
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 期号: 12, 页码: 1843-1863
Guo, YF
;
Zhang, ZF
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2016/12/09
Authenticated Key Exchange
Security Model
Certificate-based protocols
Identity-based protocols
基于双线性对的双向认证密钥交换协议
期刊论文
2014
黄朝阳
;
汤碧玉
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2016/05/17
双线性对
椭圆曲线
指纹
智能卡
杂凑函数
随机数
口令认证
bilinear pairings
elliptic curve
fingerprint
smart card
hash function
random number
password authentication
An ID-based certified e-mail protocol with STTP suitable for wireless mobile environments
期刊论文
Journal of Computers, 2013, 卷号: 8, 期号: 1, 页码: 3-9
作者:
Wang, Caifen
;
Lan, Caihui
;
Niu, Shufen
;
Cao, Xiaojun
;
Gong, Minan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2016/07/15
Certification process
Certified e-mail
Communication cost
Fair exchange
ID-based
ID-based cryptography
Id-based public key cryptographies
Identity-based signcryption
Public key authentication
Re-encryption
Semi-trusted third parties
Signcryption
Trusted third parties
Wireless mobile environments
Efficient identity-based authenticated multiple key exchange protocol
期刊论文
ACTA SCIENTIARUM-TECHNOLOGY, 2013, 卷号: 35, 期号: 4
作者:
Chen, Yitao
;
Han, Weiwei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
ID-based
authenticated multiple key exchange
elliptic curve
bilinear pairing
random oracle
Identity-based authenticate key exchange protocol from lattice
期刊论文
Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013, 2013, 页码: 564-568
作者:
Wang, Hao
;
Zhao, Chuan
;
Xu, Qiuliang
;
Wang, Yilei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/23
Authenticated key exchange
CK model
Identity-based cryptosystem
Lattice
LWE assumption
Without random oracle
Identity-Based Authenticate Key Exchange Protocol from Lattice
会议论文
9th International Conference on Computational Intelligence and Security (CIS), DEC 14-15, 2013
作者:
Wang, Hao
;
Zhao, Chuan
;
Xu, Qiuliang
;
Wang, Yilei
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/31
lattice
identity-based cryptosystem
authenticated key exchange
CK
model
without random oracle
LWE assumption
an id-based authenticated dynamic group key agreement with optimal round
期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 11, 页码: 2542-2554
Teng JiKai
;
Wu ChuanKun
;
Tang ChunMing
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2013/09/17
identity-based cryptography
dynamic group key agreement
provably secure
admissible pairing
authenticated key exchange with entities from different settings and varied groups
会议论文
6th International Conference on Provable Security, ProvSec 2012, Chengdu, China, September 26, 2012 - September 28, 2012
Guo Yanfei
;
Zhang Zhenfeng
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2013/09/22
Efficient three-party authenticated key agreement protocol in certificateless cryptography
期刊论文
international journal of computer mathematics, 2011
Xiong, Hu
;
Chen, Zhong
;
Qin, Zhiguang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2015/11/10
information security
protocol design
authentication
key agreement
three party
PAIRINGS
©版权所有 ©2017 CSpace - Powered by
CSpace