设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Springer电子图书(3)
CNKI学位论文(427)
知网期刊论文(422)
在“
Elsevier电子期刊
”中,
命中:
21
条,耗时:0.0389784 秒
在所有数据库中总计命中:
852
条
1.
A secure and efficient
Ciphertext
-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing
作者:
Y. Sreenivasa Rao
y.sreenivasarao2008@gmail.com" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Personal health record system
;
Attribute-based signcryption
;
Signcryptor privacy
;
Public verifiability
;
Chosen
ciphertext
attack
;
Short
ciphertext
刊名:Future Generation Computer Systems
出版年:2017
2.
An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems
作者:
Xiang Li
a
;
Leyuan Wang
b
;
Yinfa Yan
b
;
Ping Liu
b
;
a
;
c
;
liupingshd@126.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Color image encryption
;
Complex hyper-chaotic Lorenz system
;
Deoxyribonucleic acid sequence
;
Exclusive or operations
;
The quaternary chaotic sequence
刊名:Optik - International Journal for Light and Electron Optics
出版年:2016
3.
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
作者:
Yanwei Zhou
a
;
b
;
c
;
Bo Yang
a
;
b
;
c
;
byang@snnu.edu.cn" class="auth_mail" title="E-mail the corresponding author
;
Wenzheng Zhang
b
关键词:
Certificateless signcryption
;
Leakage-resilient
;
Computational Diffie&ndash
;
Hellman
;
Discrete logarithm
;
IND-KL-CCA2
;
EUF-KL-CMA
刊名:Discrete Applied Mathematics
出版年:2016
4.
Revocable hierarchical identity-based encryption via history-free approach
作者:
Jae Hong Seo
a
;
jaehongseo@mju.ac.kr" class="auth_mail" title="E-mail the corresponding author
;
Keita Emura
b
;
k-emura@nict.go.jp" class="auth_mail" title="E-mail the corresponding author
关键词:
(Hierarchical) identity-based encryption
;
Revocation
;
Delegation
刊名:Theoretical Computer Science
出版年:2016
5.
Efficient authentication and access control of message dissemination over vehicular ad hoc network
作者:
Qian Kang
a
Author Vitae
;
Xuejiao Liu
a
;
liuxuejiao0406@163.com" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Yiyang Yao
b
Author Vitae
;
Zhiqiang Wang
b
Author Vitae
;
Yang Li
a
Author Vitae
关键词:
VANETs security
;
Attribute-based encryption
;
Identity based signature
;
Message authentication
刊名:Neurocomputing
出版年:2016
6.
Ciphertext
-policy hierarchical attribute-based encryption with
short
ciphertext
s
作者:
Hua Deng
a
;
b
;
Qianhong Wu
b
;
qhwu@xidian.edu.cn" class="auth_mail
;
Bo Qin
c
;
Josep Domingo-Ferrer
d
;
Lei Zhang
e
;
Jianwei Liu
b
;
Wenchang Shi
c
关键词:
Cloud storage
;
Access control
;
Attribute-based encryption
;
Ciphertext
-policy attribute-based encryption
刊名:Information Sciences
出版年:10 August 2014
7.
Chosen-
ciphertext
secure anonymous conditional proxy re-encryption with keyword search
作者:
Liming Fang
a
;
fangliming@nuaa.edu.cn
;
Willy Susilo
b
;
wsusilo@uow.edu.au
;
Chunpeng Ge
a
;
gecp@nuaa.edu.cn
;
Jiandong Wang
a
;
aics@nuaa.edu.cn
关键词:
Public key encryption
;
Conditional proxy re-encryption
;
Keyword search
;
Anonymity
;
Chosen-
ciphertext
security
刊名:Theoretical Computer Science
出版年:2012
8.
Adaptively secure non-interactive threshold cryptosystems
作者:
Benoî
;
t Libert
a
;
benoit.libert@uclouvain.be
;
benoit.libert@technicolor.com
;
Moti Yung
b
;
c
;
motiyung@gmail.com
关键词:
Threshold cryptography
;
Encryption schemes
;
Digital signatures
;
Adaptive corruptions
;
Non-interactivity
;
Chosen-
ciphertext
security
;
Chosen-message attacks
刊名:Theoretical Computer Science
出版年:2013
9.
Provably secure threshold public-key encryption with adaptive security and
short
ciphertext
s
作者:
Bo Qin
;
Qianhong Wu
;
Lei Zhang
;
Oriol Farr¨¤s
;
Josep Domingo-Ferrer
关键词:
Public-key cryptosystem
;
Threshold public-key encryption
;
Adaptive security
;
Access control
刊名:Information Sciences
出版年:2012
10.
Fully secure identity-based signcryption scheme with
short
er signcryptext in the standard model
作者:
Xiangxue Li
a
;
b
;
Haifeng Qian
a
;
hfqian@cs.ecnu.edu.cn
;
Jian Weng
c
;
Yu Yu
a
关键词:
Signcryption
;
Standard model
;
Semantic security
;
Existential unforgeability
;
Identity-based cryptography
刊名:Mathematical and Computer Modelling
出版年:2013
1
2
3
按检索点细分(21)
题名(3)
关键词(2)
文摘(18)
按出版年细分(21)
2017年(1)
2016年(4)
2013年(3)
2012年(4)
2011年(1)
2010年(1)
2009年(2)
2006年(1)
2003年(1)
2001年(1)
2000年及以前(2)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.