咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 理学
    • 2 篇 数学
  • 2 篇 工学
    • 2 篇 电气工程
    • 2 篇 网络空间安全
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 计算机科学与技术...

主题

  • 2 篇 standard model
  • 2 篇 continuous leaka...
  • 2 篇 cca security
  • 1 篇 identity based e...
  • 1 篇 identity-based e...

机构

  • 1 篇 school of comput...
  • 1 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 state key labora...
  • 1 篇 engineering labo...

作者

  • 1 篇 yanwei zhou
  • 1 篇 yang bo
  • 1 篇 zhou yanwei
  • 1 篇 bo yang

语言

  • 2 篇 英文
检索条件"主题词=Continuous leakage-resilience"
2 条 记 录,以下是1-10 订阅
排序:
Practical continuous leakage-resilient CCA secure identity-based encryption
收藏 引用
Frontiers of Computer Science 2020年 第4期14卷 167-180页
作者: Yanwei ZHOU Bo YANG School of Computer Science Shaanxi Normal UniversityXi’an710119China State Key Laboratory of Cryptology Beijing100878China
leakage of private information including private keys of user has become a threat to the security of computing systems.It has become a common security requirement that a cryptographic scheme should withstand various l... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
continuous leakage-Resilient Identity-Based Encryption Scheme with CCA Security
收藏 引用
Chinese Journal of Electronics 2019年 第4期28卷 682-689页
作者: ZHOU Yanwei YANG Bo Engineering Laboratory of Teaching Information Technology of Shaanxi Province Shaanxi Normal University School of Computer Science Shaanxi Normal University State Key Laboratory of Information Security Institute of Information Engineering
leakage of private information including private key has become a threat to the security of computing systems. It has become a common security requirement that a cryptographic scheme should withstand various leakage a... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论