咨询与建议

限定检索结果

文献类型

  • 55 篇 期刊文献
  • 15 篇 会议

馆藏范围

  • 70 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 62 篇 工学
    • 46 篇 计算机科学与技术...
    • 21 篇 网络空间安全
    • 17 篇 电气工程
    • 10 篇 控制科学与工程
    • 10 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 8 篇 信息与通信工程
    • 5 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
    • 1 篇 公安技术
  • 26 篇 理学
    • 19 篇 数学
    • 4 篇 生物学
    • 3 篇 物理学
    • 1 篇 化学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
    • 1 篇 公共管理
  • 3 篇 法学
    • 2 篇 社会学
    • 1 篇 法学
  • 2 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 农学
    • 1 篇 园艺学
    • 1 篇 林学

主题

  • 70 篇 digital signatur...
  • 10 篇 cryptography
  • 7 篇 proxy signature
  • 5 篇 security
  • 5 篇 provable securit...
  • 3 篇 elliptic curve
  • 3 篇 discrete logarit...
  • 3 篇 blockchain
  • 3 篇 image authentica...
  • 3 篇 certificateless
  • 2 篇 ecdsa
  • 2 篇 partially blind ...
  • 2 篇 threshold scheme
  • 2 篇 blind signature
  • 2 篇 random oracle
  • 2 篇 rsa
  • 2 篇 fair exchange
  • 2 篇 directed signatu...
  • 2 篇 bilinear pairing...
  • 2 篇 identity authent...

机构

  • 3 篇 state key labora...
  • 2 篇 school of comput...
  • 2 篇 college of compu...
  • 2 篇 武警工程学院
  • 2 篇 school of cyber ...
  • 1 篇 guangzhou key la...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 faculty of engin...
  • 1 篇 universitéde sou...
  • 1 篇 universidad euro...
  • 1 篇 chitkara univers...
  • 1 篇 university colle...
  • 1 篇 school of comput...
  • 1 篇 centre for excel...
  • 1 篇 department of pr...
  • 1 篇 school of comput...
  • 1 篇 school of inform...

作者

  • 2 篇 kang baoyuan
  • 2 篇 jianfeng ma
  • 2 篇 韩益亮
  • 2 篇 杨晓元
  • 2 篇 戴一奇
  • 1 篇 xiao guozhen
  • 1 篇 胡广伍
  • 1 篇 jing dongya
  • 1 篇 qiong huang
  • 1 篇 张欣雨
  • 1 篇 罗平
  • 1 篇 覃伯平
  • 1 篇 张青
  • 1 篇 qin yanlin wu xi...
  • 1 篇 wang yumin
  • 1 篇 lei he
  • 1 篇 怀进鹏
  • 1 篇 xindi ma
  • 1 篇 mohsen machhout
  • 1 篇 hammam alshazly

语言

  • 56 篇 英文
  • 14 篇 中文
检索条件"主题词=Digital Signature"
70 条 记 录,以下是1-10 订阅
排序:
A Secure Hardware Implementation for Elliptic Curve digital signature Algorithm
收藏 引用
Computer Systems Science & Engineering 2023年 第3期44卷 2177-2193页
作者: Mouna Bedoui Belgacem Bouallegue Abdelmoty M.Ahmed Belgacem Hamdi Mohsen Machhout Mahmoud M.Khattab Electronics and Micro-Electronics Laboratory(E.μ.E.L) Faculty of Sciences of MonastirUniversity of MonastirMonastirTunisia College of Computer Science King Khalid UniversityAbhaSaudi Arabia Universitéde Sousse Institut Supérieur des Sciences Appliquées et de Technologie de SousseSousseTunisie
Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
digital signature systems based on smart card and fingerprint feature
收藏 引用
Journal of Systems Engineering and Electronics 2007年 第4期18卷 825-834页
作者: You Lin Xu Maozhi Zheng Zhiming Coll. of Communication Engineering Hangzhou Dianzi Univ. Hangzhou 310018 P. R. China School of Mathematics Peking University Beijing 100871 P. R. China School of Science Beijing Univ. of Aeronautics and Astronautics Beijing 100083 P. R. China
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
digital signature Based on ISRSAC
收藏 引用
China Communications 2021年 第1期18卷 161-168页
作者: Teng Yang Yanshuo Zhang Song Xiao Yimin Zhao Xidian University Xi’an 710071China Beijing Electronic Science and Technology Institute Beijing 100070China
digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure and Incidental Distortion Tolerant digital signature for Image Authentication
收藏 引用
Journal of Computer Science & Technology 2007年 第4期22卷 618-625页
作者: 张勇东 唐胜 李锦涛 Key Laboratory of Intelligent Information Institute of Computing TechnologyChinese Academy of Sciences
In this paper, a secure and incidental distortion tolerant signature method for image authentication is proposed. The generation of authentication signature is based on Hotelling's T-square Statistic (HTS) via Prin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Attack on digital Multi-signature Scheme Based on Elliptic Curve Cryptosystem
收藏 引用
Journal of Computer Science & Technology 2007年 第1期22卷 92-94页
作者: 刘铎 罗平 戴一奇 Department of Computer Science and Technology Tsinghua University Bcijing 100084 China
The concept of multisignature, in which multiple signers can cooperate to sign the same message and any verifier can verify the validity of the multi-signature, was first introduced by Itakura and Nakamura. Several mu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Efficient and Provably Secure SM2 Key-Insulated signature Scheme for Industrial Internet of Things
收藏 引用
工程与科学中的计算机建模(英文) 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Two Improved digital signature Schemes
收藏 引用
Journal of Systems Engineering and Electronics 2001年 第1期12卷 78-81页
作者: Lin Bogang Dept. of Computer and Technology, Fuzhou University, 350002, P. R. China Qiu Hongduan College of Qiaoxin Light Industry, Fuzhou University, 350002, P. R. China Dept. of Computer and Technology Fuzhou University 350002 P. R. China College of Qiaoxin Light Industry Fuzhou University 350002 P. R. China
In this paper, two improved digital signature schemes are presented based on the design of directed signature scheme. The peculiarity of the system is that only if the scheme is specific recipient, the signature is au... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis on AW digital signature scheme based on error-correcting codes
收藏 引用
Science in China(Series F) 2002年 第5期45卷 397-400页
作者: 张振峰 冯登国 戴宗铎 State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China College of Mathematics and Information Science Henan University Kaifeng China
In 1993, Alabhadi and Wicker gave a modification to Xinmei digital signature Scheme based on error-correcting codes, which is usually denoted by AW Scheme. In this paper we show that the AW Scheme is actually not secu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Merkle Tree digital signature and Trusted Computing Platform
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1467-1472页
作者: WANG Xiaofei HONG Fan TANG Xueming CUI Guohua College of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 Hubei China
Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
DESIGN OF A digital signature SCHEME BASED ON FACTORING AND DISCRETE LOGARITHMS
收藏 引用
Journal of Pharmaceutical Analysis 2004年 第2期16卷 114-118页
作者: 杨利英 覃征 胡广伍 王志敏 Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049 China
Objective Focusing on the s ecurity problem of authentication and confidentiality in the context of computer networks, a digital signature scheme was proposed based on the public key crypt osystem. Methods Firstly... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论