UM

Browse/Search Results:  1-5 of 5 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018,Volume: 55,Issue: 12,Page: 2674-2684
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite  |  View/Download:2/0  |  Submit date:2019/04/04
Anonymous  Elliptic curve cryptography  Grouping-proof  Privacy  RFID security  
Design of image cipher using block-based scrambling and image filtering Journal article
INFORMATION SCIENCES, 2017,Volume: 396,Page: 97-113
Authors:  Hua, Zhongyun;  Zhou, Yicong
Favorite  |  View/Download:16/0  |  Submit date:2018/10/30
Block-based Scrambling  Cryptosystem  Image Encryption  Image Filtering  
Identity-based group proxy signature scheme in the standard model Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013,Volume: 50,Issue: 7,Page: 1370-1386
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
Proxy signature in the standard model: constructing security model and proving security Journal article
Ruan Jian Xue Bao/Journal of Software, 2012,Volume: 23,Issue: 9,Page: 2416-2429
Authors:  Gu K.;  Jia W.-J.;  Wang S.-C.;  Shi L.-W.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
CDHP  Identity  Provable security  Proxy signature  
Asymptotic model of deterministic randomness and its application to secure communications Journal article
WSEAS Transactions on Circuits and Systems, 2006,Volume: 5,Issue: 3,Page: 305-310
Authors:  Zhou J.;  Pei W.;  Wang K.;  He Z.;  Au O.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/22
Chaotic cryptography  Deterministic randomness  Lissajous map