UM

Browse/Search Results:  1-3 of 3 Help

Filters        
Selected(0)Clear Items/Page:    Sort:
Identity-based group proxy signature scheme in the standard model Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013,Volume: 50,Issue: 7,Page: 1370-1386
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
Proxy signature in the standard model: constructing security model and proving security Journal article
Ruan Jian Xue Bao/Journal of Software, 2012,Volume: 23,Issue: 9,Page: 2416-2429
Authors:  Gu K.;  Jia W.-J.;  Wang S.-C.;  Shi L.-W.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
CDHP  Identity  Provable security  Proxy signature  
Asymptotic model of deterministic randomness and its application to secure communications Journal article
WSEAS Transactions on Circuits and Systems, 2006,Volume: 5,Issue: 3,Page: 305-310
Authors:  Zhou J.;  Pei W.;  Wang K.;  He Z.;  Au O.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/22
Chaotic cryptography  Deterministic randomness  Lissajous map