UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018,Volume: 55,Issue: 12,Page: 2674-2684
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite  |  View/Download:2/0  |  Submit date:2019/04/04
Anonymous  Elliptic curve cryptography  Grouping-proof  Privacy  RFID security  
Medical image encryption using high-speed scrambling and pixel adaptive diffusion Journal article
SIGNAL PROCESSING, 2018,Volume: 144,Page: 134-144
Authors:  Hua, Zhongyun;  Yi, Shuang;  Zhou, Yicong
Favorite  |  View/Download:13/0  |  Submit date:2018/10/30
Cryptosystem  Image Encryption  Medical Image  High-speed Scrambling  Pixel Adaptive Diffusion  
Design of image cipher using block-based scrambling and image filtering Journal article
INFORMATION SCIENCES, 2017,Volume: 396,Page: 97-113
Authors:  Hua, Zhongyun;  Zhou, Yicong
Favorite  |  View/Download:12/0  |  Submit date:2018/10/30
Block-based Scrambling  Cryptosystem  Image Encryption  Image Filtering  
Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique Conference paper
2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, Orlando, FL, DEC 13-16, 2015
Authors:  Li Y.;  Zhou J.;  Li Y.;  Au O.C.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/22
Ciphertext Expansion  Homomorphic Encryption  Linear Interpolation  
Ciphertext-only attack on an image homomorphic encryption scheme with small ciphertext expansion Conference paper
MM 2015 - Proceedings of the 2015 ACM Multimedia Conference, Brisbane, AUSTRALIA, OCT 26-30, 2015
Authors:  Li Y.;  Zhou J.;  Li Y.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/22
Identity-based group proxy signature scheme in the standard model Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013,Volume: 50,Issue: 7,Page: 1370-1386
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
Proxy signature in the standard model: constructing security model and proving security Journal article
Ruan Jian Xue Bao/Journal of Software, 2012,Volume: 23,Issue: 9,Page: 2416-2429
Authors:  Gu K.;  Jia W.-J.;  Wang S.-C.;  Shi L.-W.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/11
CDHP  Identity  Provable security  Proxy signature  
Asymptotic model of deterministic randomness and its application to secure communications Journal article
WSEAS Transactions on Circuits and Systems, 2006,Volume: 5,Issue: 3,Page: 305-310
Authors:  Zhou J.;  Pei W.;  Wang K.;  He Z.;  Au O.
Favorite  |  View/Download:1/0  |  Submit date:2018/12/22
Chaotic cryptography  Deterministic randomness  Lissajous map