搜索筛选:
搜索耗时4.2697秒,为你在为你在102,285,761篇论文里面共找到 7 篇相符的论文内容
类      型:
[期刊论文] 作者:Debiao HE,Ding WANG,Qi XIE,Kefei CHEN,, 来源:Science China(Information Sciences) 年份:2017
With the development of the wireless communication technology and the popularity of mobile devices, the mobile wireless network(MWN) has been widely used in our...
[期刊论文] 作者:Debiao HE,Neeraj KUMAR,Han SHEN,Jong-Hyouk LEE,, 来源:Science China(Information Sciences) 年份:2016
In traditional authentication schemes for access control in mobile pay-TV systems, one-to-one delivery is used, i.e., one authentication message per request is...
[会议论文] 作者:Huaqun Wang,Debiao He,Jia Yu,Zhiwei Wang, 来源:2017年安全协议进展国际会议 年份:2017
Outline 1 Introduction2 Motivation3 Our Contributions4 System model and security model5 The concrete scheme6 Performance Analysis and Security Analysis7 Conclus...
[期刊论文] 作者:Chenyu WANG,Ding WANG,Guoai XU,Debiao HE, 来源:中国科学:信息科学(英文版) 年份:2022
Industry 4.0,which combines information technology,network and industrial production,is expected to have a tremendous impact on our daily lives.In such a complex and security-critical system with resource-constrained sensor nodes,the design......
[期刊论文] 作者:Yudi ZHANG,Debiao HE,Mingwu ZHANG,Kim-Kwang Raymond CHOO, 来源:计算机科学前沿 年份:2020
Mobile devices are widely used for data access,communications and storage.However,storing a private key for signature and other cryptographic usage on a single...
[会议论文] 作者:Libing Wu,Yubo Zhang,Kim-Kwang Raymond Choo,Debiao He, 来源:中国密码学会2017年密码算法学术会议 年份:2017
  Efficient searching on encrypted data outsourced to the cloud remains a research challenge.Identity-based encryption with equality test (IBEET) scheme has r...
[期刊论文] 作者:Weizhi Meng,Daniel Xiapu Luo,Chunhua Su,Debiao He,Marios Anagnostopoulos,Qian Chen, 来源:数字通信与网络:英文版 年份:2021
IoT devices like smartphones have become an important personal assistant and an indispensable part of our daily life and work.As more and more users storing their private data on their mobile phones,it becomes imperative to develop secure m......
相关搜索: