UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Identity-based group proxy signature scheme in the standard model Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013,Volume: 50,Issue: 7,Page: 1370-1386
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
A group proxy signature scheme based on sub-secret evolution Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012,Volume: 49,Issue: 5,Page: 962-973
Authors:  Gu K.;  Jia W.;  Jiang C.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
CDHP  Cellular automata  Provable security  Proxy signature  Sub-secret evolution  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:784/147  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid  
A group proxy signature scheme based on key matrix Journal article
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2011,Volume: 43,Issue: 4,Page: 108-115
Authors:  Gu K.;  Jia W.-J.;  Jiang C.-L.
Favorite  |  View/Download:6/0  |  Submit date:2019/02/11
Bilinear transformation  CDHP  Key matrix  Proxy signature