CORC

浏览/检索结果: 共7条,第1-7条 帮助

已选(0)清除 条数/页:   排序方式:
Fault diagnosis of a transformer based on polynomial neural networks 期刊论文
2017, 页码: 1
作者:  Zou, Ajin[1];  Deng, Rui[1];  Mei, Qixiang[2];  Zou, Lang[3]
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/26
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption 期刊论文
2016, 卷号: 13, 期号: [db:dc_citation_issue], 页码: 533
作者:  Mao, Xianping[1];  Lai, Junzuo[2];  Mei, Qixiang[3];  Chen, Kefei[4];  Weng, Jian[2]
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/03
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption 期刊论文
2016, 卷号: 13, 期号: 5, 页码: 533
作者:  Mao, Xianping[1];  Lai, Junzuo[2];  Mei, Qixiang[3];  Chen, Kefei[4];  Weng, Jian[2]
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/26
Efficient revocable identity-based encryption from multilinear maps 期刊论文
2015, 卷号: 8, 期号: 18, 页码: 3511
作者:  Mao, Xianping[1];  Lai, Junzuo[2];  Chen, Kefei[3];  Weng, Jian[2];  Mei, Qixiang[4]
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/23
Efficient revocable identity-based encryption from multilinear maps 期刊论文
2015, 卷号: 8, 期号: 18, 页码: 3511
作者:  Mao, Xianping[1];  Lai, Junzuo[2];  Chen, Kefei[3];  Weng, Jian[2];  Mei, Qixiang[4]
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/27
RKA Secure PKE Based on the DDH and HR Assumptions 会议论文
Melaka, MALAYSIA, OCT 23-25, 2013
作者:  Jia, Dingding[1,2];  Lu, Xianhui[1];  Li, Bao[1];  Mei, Qixiang[3]
收藏  |  浏览/下载:0/0  |  提交时间:2019/12/26
Improving the message-ciphertext rate of Lewko's fully secure IBE scheme 会议论文
Lanzhou, China, May 12, 2013 - May 14, 2013
作者:  Jia, Dingding[1,2];  Li, Bao[1,2];  Liu, Yamin[1,2];  Mei, Qixiang[3]
收藏  |  浏览/下载:0/0  |  提交时间:2019/12/26


©版权所有 ©2017 CSpace - Powered by CSpace