设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Wiley电子期刊(3)
SpringerLink电子期刊(205)
Elsevier电子期刊(109)
Springer电子图书(4)
ProQuest学位论文(5)
在“
Elsevier电子期刊
”中,
命中:
109
条,耗时:小于0.01 秒
在所有数据库中总计命中:
326
条
1.
Color transfer visual
cryptography
with perfect security
作者:
Ching-Nung Yang
a
;
cnyang@mail.ndhu.edu.tw
;
Tzu-Chia Tung
a
;
Fu-Heng Wu
a
;
Zhili Zhou
b
关键词:
Visual
cryptography
;
Secret sharing
;
Threshold
scheme
;
Digital halftoning
;
Halftoned image
;
Color transfer
刊名:Measurement
出版年:2017
2.
New privilege-based visual
cryptography
with arbitrary privilege levels
作者:
Ching-Nung Yang
a
;
Jung-Kuo Liao
a
;
Dao-Shun Wang
b
;
c
;
daoshun@mail.tsinghua.edu.cn
关键词:
Visual
cryptography
;
Visual secret sharing
;
Threshold
scheme
;
Privilege level
;
Contrast
刊名:Journal of Visual Communication and Image Representation
出版年:2017
3.
DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks
作者:
Duygu Karaoğlan Altop
duyguk@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Muhammed Ali Bingö
;
l
;
mabingol@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
;
muhammedali.bingol@tubitak.gov.tr" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Albert Levi
levi@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Erkay Savaş
erkays@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Wireless Mesh Networks
;
Key establishment
;
Identity-based
cryptography
;
Threshold
secret sharing
刊名:Ad Hoc Networks
出版年:2017
4.
Born and raised distributively: Fully distributed non-interactive adaptively-secure
threshold
signatures with short shares
作者:
Benoî
;
t Libert
a
;
benoit.libert@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Marc Joye
b
;
marc.joye@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Moti Yung
c
;
moti@cs.columbia.edu" class="auth_mail" title="E-mail the corresponding author
关键词:
Threshold
signatures
;
Fully distributed schemes
;
Non-interactivity
;
Adaptive security
;
Efficiency
;
Availability
;
Fault tolerance
;
Distributed key generation
;
Erasure-freeness
刊名:Theoretical Computer Science
出版年:2016
5.
Sub
threshold
Circuit Designing and Implementation of Finite Field Multiplier for
Cryptography
Application
作者:
Praveen Singh
a
;
Vaibhav Neema
a
;
vaibhav.neema@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Shreeniwas Daulatabad
b
;
Ambika Prasad Shah
a
关键词:
Power analysis attack
;
Sub
threshold
;
Cryptography
;
Finite field multiplier
刊名:Procedia Computer Science
出版年:2016
6.
Verifiable (t,n)
threshold
quantum secret sharing using d-dimensional Bell state
作者:
Huawang Qin
;
qin_h_w@163.com" class="auth_mail" title="E-mail the corresponding author
;
Yuewei Dai
关键词:
Quantum secret sharing
;
Verifiable quantum secret sharing
;
Bell state
;
Quantum
cryptography
;
Cryptography
刊名:Information Processing Letters
出版年:2016
7.
Secret image sharing scheme with hierarchical
threshold
access structure
作者:
Nasrollah Pakniat
n_pakniat@sbu.ac.ir" class="auth_mail
;
Mahnaz Noroozi
m.noroozi@mail.sbu.ac.ir" class="auth_mail
;
Ziba Eslami
;
z_eslami@sbu.ac.ir" class="auth_mail
关键词:
Cryptography
;
Secret image sharing
;
Hierarchical
threshold
access structure
;
Cellular automata
;
Birkhoff interpolation
;
Information hiding
;
Reversibility
;
Tamper detection
刊名:Journal of Visual Communication and Image Representation
出版年:July 2014
8.
Two new identity-based
threshold
ring signature schemes
作者:
Lunzhi Deng
a
;
denglunzhi@163.com" class="auth_mail
;
Jiwen Zeng
b
关键词:
Identity-based
cryptography
;
Threshold
ring signature
;
Pairings
;
Random oracle model
刊名:Theoretical Computer Science
出版年:22 May 2014
9.
Multilevel
threshold
secret sharing based on the Chinese Remainder Theorem
作者:
Lein Harn
a
;
;
Miao Fuyou
b
关键词:
Multilevel secret sharing
;
Chinese Remainder Theorem
;
Asmuth&ndash
;
Bloom's secret sharing scheme
;
Threshold
value
;
Multilevel secret sharing scheme
;
Cryptography
刊名:Information Processing Letters
出版年:September 2014
10.
Symmetric
Threshold
Multipath (STM): An online symmetric key management scheme
作者:
Alireza T. Boloorchi
;
boloorc@okstate.edu" class="auth_mail
;
alireza.boloorchi@gmail.com" class="auth_mail
;
M.H. Samadzadeh
;
T. Chen
关键词:
Threshold
secret sharing
;
Symmetric key management
;
Online key distribution
;
Multipath communication
刊名:Information Sciences
出版年:1 June, 2014
1
2
3
4
5
6
7
8
9
按检索点细分(109)
题名(4)
关键词(50)
文摘(43)
按出版年细分(109)
2027年及以后(6)
2017年(3)
2016年(3)
2013年(7)
2012年(9)
2011年(8)
2010年(5)
2009年(5)
2008年(5)
2007年(16)
2006年(8)
2005年(8)
2004年(9)
2003年(2)
2002年(1)
2001年(1)
2000年(2)
2000年及以前(11)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.