×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [16]
山东大学 [14]
软件研究所 [12]
北京大学 [7]
清华大学 [5]
西安交通大学 [4]
更多...
内容类型
期刊论文 [64]
会议论文 [5]
其他 [3]
学位论文 [1]
发表日期
2020 [1]
2019 [4]
2018 [6]
2017 [6]
2016 [8]
2015 [2]
更多...
学科主题
Computer S... [5]
Informatio... [3]
Engineerin... [1]
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共73条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0
期刊论文
COMPUTER NETWORKS, 2020, 卷号: 179, 页码: 18
作者:
Zhang, Qianying
;
Zhao, Shijun
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/12/10
Security analysis
Authenticated key exchange
TPM 2.0
Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 页码: 878-890
作者:
Zhang, Jie
;
Huang, Xin
;
Wang, Wei
;
Yue, Yong
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/11/19
Authenticated key exchange (AKE)
unbalanced computational requirements
identity-based (ID-based) cryptography
disaster scenarios
pairing-free
Provably secure anonymous three-factor authentication scheme for multi-server environments
期刊论文
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 卷号: 10, 期号: 2
作者:
Xu, Dongqing
;
Chen, Jianhua
;
Liu, Qin
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/05
Key exchange
Three-factor
Multi-server
ECC
Privileged insider attack
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
期刊论文
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 卷号: 10, 期号: 8, 页码: 3133-3142
作者:
Chen, Chien-Ming
;
Wang, King-Hang
;
Yeh, Kuo-Hui
;
Xiang, Bin
;
Wu, Tsu-Yang
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/11
Authenticated key exchange
Password-based
Wireless communication
Proverif
Key reuse attack on newhope key exchange protocol
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 卷号: 11396 LNCS, 页码: 163-176
作者:
Liu, Chao
;
Zheng, Zhongxiang
;
Zou, Guangnan
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/11
Active attack
Key exchange
Key reuse
Post quantum
RLWE
Signature-based three-factor authenticated key exchange for internet of things applications
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 卷号: 77, 期号: 14
作者:
Jia, Xiaoying
;
He, Debiao
;
Li, Li
;
Choo, Kim-Kwang Raymond
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Internet of things
Three-factor authenticated key exchange
Biometrics
Fuzzy extractor
A general compiler for password-authenticated group key exchange protocol in the standard model
期刊论文
DISCRETE APPLIED MATHEMATICS, 2018, 卷号: 241
作者:
Wei, Fushan
;
Kumar, Neeraj
;
He, Debiao
;
Yeo, Sang-Soo
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Group communications
Password
Authenticated key exchange
Compiler
A provably-secure two-factor authenticated key exchange protocol with stronger anonymity
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 11058 LNCS, 页码: 111-124
作者:
Yang, Xiaoyan
;
Jiang, Han
;
Hou, Mengbo
;
Zheng, Zhihua
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Anonymous authentication
Authenticated key exchange
Two-factor authentication
Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2018, 卷号: 19, 期号: 3, 页码: 679-687
作者:
Chen, Chien-Ming
;
Xu, Linlin
;
Wang, King-Hang
;
Liu, Shuai
;
Wu, Tsu-Yang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/11
Chaotic map
Cryptography
Authentication key exchange protocol
Security authentication technology based on dynamic Bayesian network in Internet of Things
期刊论文
Journal of Ambient Intelligence and Humanized Computing, 2018, 页码: 1-8
作者:
Qing Zhang
;
Dilong Xu
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/24
Combined public key
Dynamic Bayesian network
Internet of Things
Security authentication
Security information exchange
Trusted transmission
©版权所有 ©2017 CSpace - Powered by
CSpace