设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Wiley电子期刊(11)
SpringerLink电子期刊(326)
Elsevier电子期刊(163)
Springer电子图书(2)
ProQuest学位论文(17)
在“
Elsevier电子期刊
”中,
命中:
163
条,耗时:小于0.01 秒
在所有数据库中总计命中:
519
条
1.
A pairing-free
identity
-
based
two-party authenticated key agreement protocol for secure and efficient communication
作者:
SK Hafizul Islam
a
;
hafi786@gmail.com
;
hafizul.ism@gmail.com
;
hafizul@pilani.bits-pilani.ac.in
;
G.P. Biswas
b
关键词:
Elliptic curve
cryptography
;
Identity
-
based
cryptosystem
;
Bilinear pairing
;
Session key
;
BAN logic
刊名:Journal of King Saud University - Computer and Information Sciences
出版年:2017
2.
Insecurity of an
identity
-
based
public auditing protocol for the outsourced data in cloud storage
作者:
Debiao He
a
;
b
;
Huaqun Wang
;
c
;
wanghuaqun@yahoo.com.cn" class="auth_mail" title="E-mail the corresponding author
;
wanghuaqun@aliyun.com" class="auth_mail" title="E-mail the corresponding author
;
Jianhong Zhang
d
;
Lina Wang
e
关键词:
Public auditing
;
Identity
-
based
cryptography
;
Provable security
;
Bilinear pairing
刊名:Information Sciences
出版年:2017
3.
DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks
作者:
Duygu Karaoğlan Altop
duyguk@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Muhammed Ali Bingö
;
l
;
mabingol@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
;
muhammedali.bingol@tubitak.gov.tr" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Albert Levi
levi@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Erkay Savaş
erkays@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Wireless Mesh Networks
;
Key establishment
;
Identity
-
based
cryptography
;
Threshold secret sharing
刊名:Ad Hoc Networks
出版年:2017
4.
Combined schemes for signature and encryption: The public-key and the
identity
-
based
setting
作者:
Marí
;
a Isabel Gonzá
;
lez Vasco
a
;
mariaisabel.vasco@urjc.es" class="auth_mail" title="E-mail the corresponding author
;
Florian Hess
b
;
florian.hess@uni-oldenburg.de" class="auth_mail" title="E-mail the corresponding author
;
Rainer Steinwandt
c
;
rsteinwa@fau.edu" class="auth_mail" title="E-mail the corresponding author
关键词:
Combined scheme
;
Identity
-
based
cryptography
;
Public-key
cryptography
;
Key separation
刊名:Information and Computation
出版年:2016
5.
Strongly secure
identity
-
based
authenticated key agreement protocols without bilinear pairings
作者:
Liang Ni
;
a
;
b
;
niliang402@126.com" class="auth_mail" title="E-mail the corresponding author
;
niliang402@hotmail.com" class="auth_mail" title="E-mail the corresponding author
;
1165060759@qq.com" class="auth_mail" title="E-mail the corresponding author
;
Gongliang Chen
b
;
Jianhua Li
b
;
Yanyan Hao
c
关键词:
Authenticated key agreement
;
Identity
-
based
cryptography
;
Provable security
;
Diffie&ndash
;
Hellman assumption
;
The extended Canetti&ndash
;
Krawczyk model
刊名:Information Sciences
出版年:2016
6.
Practical access control for sensor networks in the context of the Internet of Things
作者:
Fagen Li
;
fagenli@uestc.edu.cn" class="auth_mail" title="E-mail the corresponding author
;
Yanan Han
;
Chunhua Jin
关键词:
Internet of Things
;
Security
;
Signcryption
;
Certificateless
cryptography
;
Identity
-
based
cryptography
刊名:Computer Communications
出版年:2016
7.
On the security of two
identity
-
based
signature schemes
based
on pairings
作者:
Zhen Qin
a
;
Chen Yuan
a
;
Yilei Wang
a
;
Hu Xiong
a
;
b
;
xionghu.uestc@gmail.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Cryptography
;
Identity
-
based
signature
;
Bilinear pairings
;
Forgery attack
;
Key disclosure attack
刊名:Information Processing Letters
出版年:2016
8.
Provably secure certificateless proxy signature scheme in the standard model
作者:
Yang Lu
;
luyangnsd@163.com" class="auth_mail" title="E-mail the corresponding author
;
Jiguo Li
ljg1688@163.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Certificateless public key
cryptography
;
Proxy signature
;
Standard model
;
Public key replacement attack
;
Malicious KGC attack
;
Existential unforgeability
刊名:Theoretical Computer Science
出版年:2016
9.
A provably secure certificate-
based
encryption scheme against malicious CA attacks in the standard model
作者:
Yang Lu
;
luyangnsd@163.com" class="auth_mail" title="E-mail the corresponding author
;
Jiguo Li
ljg1688@163.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Public key
cryptography
;
Certificate-
based
encryption
;
Malicious ca attack
;
Chosen-ciphertext security
;
Standard model
刊名:Information Sciences
出版年:2016
10.
Identity
-
based
secure group communications using pairings
作者:
Francesco Rossi
a
Author Vitae
;
Giovanni Schmid
;
b
;
giovanni.schmid@cnr.it" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Identity
-
based
cryptography
;
Pairing-
based
signatures
;
Group key agreement
刊名:Computer Networks
出版年:2015
1
2
3
4
5
6
7
8
9
按检索点细分(163)
题名(4)
关键词(69)
文摘(73)
按出版年细分(163)
2027年及以后(7)
2017年(3)
2016年(7)
2015年(2)
2013年(19)
2012年(18)
2011年(19)
2010年(14)
2009年(16)
2008年(9)
2007年(10)
2006年(3)
2005年(14)
2004年(5)
2003年(4)
2002年(2)
2001年(1)
2000年(1)
2000年及以前(9)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.