×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [17]
内容类型
期刊论文 [11]
会议论文 [6]
发表日期
2009 [17]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共17条,第1-10条
帮助
限定条件
发表日期:2009
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme
会议论文
3rd International Conference on Management of e-Commerce and e-Government, SEP 16-19, 2009
作者:
Hou, Mengbo
;
Xu, Qiuliang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
authenticated key agreement
certificateless public key cryptography
identity-based cryptography
perfect forward secrecy
key replicating
attack
A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow
会议论文
5th International Conference on Information Assurance and Security, AUG 18-20, 2009
作者:
Hou, Mengbo
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
key agreement protocol
identity-based cryptography
key escrow
perfect
forward secrecy
Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol
会议论文
Asia-Pacific Conference on Information Processing (APCIP 2009), JUL 14-19, 2009
作者:
Hou, Mengbo
;
Xu, Qiuliang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/31
key agreement protocol
identity-based cryptography
certificateless-based cryptography
implicit key authentication
key
replicating attack
A Secure Two-Party Key Agreement Protocol with Key Escrow and Perfect Forward Secrecy
会议论文
3rd International Conference on Anti-Counterfeiting, Security, and Identification in Communication, AUG 20-22, 2009
作者:
Hou, Mengbo
;
Xu, Qiuliang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
key agreement
key escrow
perfect forward secrecy
identity-based
encryption
An Enhanced Constant-Size Identity-Based Ring Signature Scheme
会议论文
2nd IEEE International Conference on Computer Science and Information Technology, AUG 08-11, 2009
作者:
Hu, Chengyu
;
Liu, Pengtao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
Secure and Efficient Two-Party Certificateless Authenticated Key Agreement Protocol
会议论文
2nd ISECS International Colloquium on Computing, Communication, Control and Management (CCCM 2009), AUG 08-09, 2009
作者:
Hou, Mengbo
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
authenticated key agreement
certificateless-based cryptography
identity-based cryptography
perfect forward secrecy
Lattice-based CCA-secure cryptosystem from IBE system
期刊论文
CIS 2009 - 2009 International Conference on Computational Intelligence and Security, 2009, 卷号: 2, 页码: 260-264
作者:
Jiang, Yali
;
Ju, Xiuling
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/26
Chosen cipher attack
Identity based encryption
Lattice
Two-party authenticated key agreement protocol from certificateless public key encryption scheme
期刊论文
2009 International Conference on Management of e-Commerce and e-Government, ICMeCG 2009, 2009, 页码: 440-444
作者:
Hou, Mengbo
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/26
Authenticated key agreement
Certificateless public key cryptography
Identity-based cryptography
Key replicating attack
Perfect forward secrecy
Key replicating attack on certificateless authenticated key agreement protocol
期刊论文
Proceedings - 2009 Asia-Pacific Conference on Information Processing, APCIP 2009, 2009, 卷号: 2, 页码: 574-577
作者:
Hou, Mengbo
;
Xu, Qiuliang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/26
Agreement protocol
Certificateless-based cryptography
Identity-based cryptography
Implicit key authentication
Key replicating attack
Identity based authenticated key agreement for tree-based group
期刊论文
IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009, 页码: 941-944
作者:
Xiangfei, Sun
;
Qiuliang, Xu
;
Tao, Ban
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/26
Identity based
Key agreement
Tree-based group
©版权所有 ©2017 CSpace - Powered by
CSpace