搜索筛选:
搜索耗时1.5208秒,为你在为你在102,285,761篇论文里面共找到 11 篇相符的论文内容
类      型:
[会议论文] 作者:WEI Guoheng,ZHANG Huanguo,WANG Ya, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
Relay attack is one of the most threatening challenges against RFID now.Distance bounding protocols have been introduced to thwart relay attacks....
[会议论文] 作者:WEI Guoheng,ZHANG Huanguo,WANG Ya, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
[期刊论文] 作者:WU WanQing,ZHANG HuanGuo,WANG HouZhen,MAO ShaoWu,JIA JianWei,LIU JinHui,, 来源:Science China(Information Sciences) 年份:2015
Since the Shor algorithm showed that a quantum algorithm can efficiently calculate discrete logarithms and factorize integers, it has been used to break the RSA...
[期刊论文] 作者:ZHANG HuanGuo,HAN WenBao,LAI XueJia,LIN DongDai,MA JianFeng,LI JianHua,, 来源:Science China(Information Sciences) 年份:2015
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and wor...
[会议论文] 作者:Zhou Shungan,Du ruiying,Chen Jing,Deng Hua,Shen Jian,Zhang Huanguo, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
Data sharing is a main application of cloud computing.Some existing solutions are proposed to provide flexible access control for outsourced data in the cloud.H...
[会议论文] 作者:Mao Shaowu,Zhang Huanguo,Wanqing Wu,Wang Houzhen,Song jun,Liu jinhui, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
[会议论文] 作者:Jia Jianwei,Wang Houzhen,Wu Wanqing,Mao Shaowu,Liu Jinhui,Zhang Huanguo, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
[会议论文] 作者:Shen Jian,Zhou Shungan,Deng Hua,Zhang Huanguo,Chen Jing,Du ruiying, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
[会议论文] 作者:Zhou shungan,Du Ruiying,Chen Jing,Shen Jian,Deng Hua,Zhang Huanguo, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
Access control is a key mechanism to secure outsourced data in mobile clouds.Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations perfo...
[会议论文] 作者:Liu Jinhui,Zhang Huanguo,Jia Jianwei,Wang Houzhen,Mao Shaowu,Wu Wanqing, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
During the last decades, many public key cryptosystems based on non-abelian algebraic structures were proposed, such as cryptosytems based on inner automorphism groups, general linear groups and braid...
[会议论文] 作者:Liu Jinhui,Jia Jianwei,Wu Shuomei,Zhang Huanguo,Wang Houzhen,Mao Shaowu, 来源:第九届中国可信计算与信息安全学术会议 年份:2015
Before going into details we would like to mention that non-abelian algebraic structures have already been used in a cryptographic context....
相关搜索: