CORC

浏览/检索结果: 共53条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 页码: 3511-3528
作者:  Wu, Faguo;  Yao, Wang;  Zhang, Xiao;  Zheng, Zhiming
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/30
Identity-based proxy signature over NTRU lattice 期刊论文
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 卷号: 32
作者:  Wu, Faguo;  Yao, Wang;  Zhang, Xiao;  Wang, Wenhua;  Zheng, Zhiming
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/30
PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 37480-37492
作者:  Gao, Tianhan;  Deng, Xinyang;  Wang, Yingbo;  Kong, Xiangjie
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/02
An Anonymous Authentication Scheme based on PMIPv6 for VANETs 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 14686-14698
作者:  Gao, Tianhan;  Deng, Xinyang;  Gu, Nan;  Wang, Xiaojie
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/02
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction 期刊论文
INFORMATION SCIENCES, 2018, 卷号: 442, 页码: 158-172
作者:  Yu, Jia;  Hao, Rong;  Xia, Hui;  Zhang, Hanlin;  Cheng, Xiangguo
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/11
Performance and Security Evaluations of Identity-and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt    (Open Access) 期刊论文
IEEE Access, 2018, 卷号: 6, 页码: 37850-37857
作者:  Zhong, Sheng;  Ren, Wei;  Zhu, Tianqing;  Ren, Yi;  Choo, Kim-Kwang Raymond*
收藏  |  浏览/下载:12/0  |  提交时间:2019/12/27
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks. 期刊论文
Sensors (Basel), 2017, 卷号: Vol.17 No.6
作者:  Wang C;  Yuan Y;  Wu J.
收藏  |  浏览/下载:10/0  |  提交时间:2019/03/04
Efficient Revocable ID-Based Signature With Cloud Revocation Server 期刊论文
IEEE ACCESS, 2017, 卷号: 5
作者:  Jia, Xiaoying;  He, Debiao;  Zeadally, Sherali;  Li, Li
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 卷号: 12, 期号: 2
作者:  He, Debiao;  Kumar, Neeraj;  Choo, Kim-Kwang Raymond;  Wu, Wei
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Privacy-preserving identity-based file sharing in smart city 期刊论文
PERSONAL AND UBIQUITOUS COMPUTING, 2017, 卷号: 21, 页码: 923-936
作者:  Luo, Xiling;  Ren, Yili;  Hu, Jiankun;  Wu, Qianhong;  Lou, Jungang
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/30


©版权所有 ©2017 CSpace - Powered by CSpace