搜索筛选:
搜索耗时2.5038秒,为你在为你在102,285,761篇论文里面共找到 16 篇相符的论文内容
类      型:
[期刊论文] 作者:Zhong Ming Yang Yixian, 来源:电子科学学刊:英文版 年份:2001
Recently, many bit commitment schemes have been presented. This paper presents a new practical bit commitment scheme based on Schnorr's one-time knowledge p...
[期刊论文] 作者:ZHONG Ming,YANG Yixian, 来源:中国电子杂志(英文版) 年份:2001
In this paper, an efficient unlinkable, divisible electronic cash based on bit commitment scheme is proposed. The complexity of every protocol in our scheme is...
[期刊论文] 作者:安靖,Fan Wenqing,Yang Yixian, 来源:高技术通讯:英文版 年份:2013
Constraint based program analysis is widely used in program validation,program vulnerability analysis,etc.This paper proposes a temporal correlation function to...
[期刊论文] 作者:马春光,Yang Yixian,Hu Zhengming, 来源:高技术通讯:英文版 年份:2005
Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single check is use...
[期刊论文] 作者:WU Qiuxin,YANG Yixian,HU Zhengming, 来源:中国电子杂志(英文版) 年份:2001
It is proved that the digital signaturescheme with one-time pair of keys proposed by X. Yi etal. In Electronics Letters in 2000 is insecure, I.e. Theadversary c...
[期刊论文] 作者:Ma Chunguang,Yang Yixian,Hu Zhengming, 来源:黑龙江科技信息 年份:2005
本文通过对荣华二采区10...
[期刊论文] 作者:WANG MingMing,CHEN XiuBo,YANG YiXian,, 来源:Science China(Physics,Mechanics & Astronomy) 年份:2013
Recently,some blind quantum signature(BQS) protocols have been proposed.But the previous schemes have security and efficiency problems.Based on the entangled Gr...
[期刊论文] 作者:Sui Aifen,Lucas C.K.Hui,Yang Yixian,K.P.Chow, 来源:城市道桥与防洪 年份:2004
Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its secur...
[期刊论文] 作者:TANG Xin,MA Zhaofeng,NIU Xinxin,YANG Yixian,, 来源:Chinese Journal of Electronics 年份:2015
A novel compressive sensing-based audio semi-fragile zero-watermarking algorithm is proposed in this paper. This algorithm transforms the original audio signal...
[期刊论文] 作者:HUANG Qinlong,MA Zhaofeng,YANG Yixian,NIU Xinxin,FU Jingyi, 来源:中国通信 年份:2014
[期刊论文] 作者:HUANG Qinlong,MA Zhaofeng,YANG Yixian,NIU Xinxin,FU Jingyi, 来源:中国通信 年份:2014
[期刊论文] 作者:DING Haiyang,LI Zichen,YANG Yixian,YOU Fucheng,LIU Fuping,, 来源:Chinese Journal of Electronics 年份:2018
This paper proposes a High quality data hiding in halftone image based on block conjugate(HQDHBC). We construct Least mean square filters(LMSF),and using LMSFs to evaluate the quality of halftone imag...
[期刊论文] 作者:HUANG Qinlong,MA Zhaofeng,YANG Yixian,FU Jingyi,NIU Xinxin,, 来源:Chinese Journal of Electronics 年份:2015
Ciphertext-policy attribute-based encryption(CP-ABE) is becoming a promising solution to guarantee data security in cloud computing. In this paper,we present an...
[期刊论文] 作者:ZHAO DaWei,PENG HaiPeng,LI LiXiang,HUI SiLi,YANG YiXian,, 来源:Science China(Information Sciences) 年份:2014
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression o...
[期刊论文] 作者:SHAN Ruiting,CHEN Xiubo,XU Gang,DOU Zhao,LI Zongpeng,MIAO Lihua,YANG Yixian, 来源:电子学报(英文版) 年份:2021
Blind quantum computing (BQC) ensures that a classical client could delegate complex computing tasks to a remote quantum server safely.In order to detect the di...
[会议论文] 作者:LI Yang,李扬,WANG Jingzhong,王景中,YANG Yixian,杨义先, 来源:中国电子学会信息论分会2009年研究生学术交流会 年份:2010
PPM算法以及其衍生出的其他算法存在计算复杂和收敛时间长等问题,产生这些问题的关键因素之一是由于标记空间不足引起的。本文在PPM算法的基础上提出了一种新的方案,通过引入统计分析模型来扩展数据包IP头部的标记空间从而达到简化算法和缩短收敛时间目的。......
相关搜索: