咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 2 篇 计算机科学与技术...
    • 1 篇 仪器科学与技术
    • 1 篇 信息与通信工程
    • 1 篇 软件工程
  • 2 篇 理学
    • 2 篇 数学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 7 篇 cryptographic pr...
  • 2 篇 data integrity
  • 2 篇 data privacy
  • 2 篇 private key cryp...
  • 1 篇 symmetric key cr...
  • 1 篇 known protocols
  • 1 篇 mutual authentic...
  • 1 篇 private vector
  • 1 篇 blockchain trans...
  • 1 篇 loet
  • 1 篇 fresh ciphertext
  • 1 篇 outsourcing
  • 1 篇 public key crypt...
  • 1 篇 low-overhead pay...
  • 1 篇 software fault t...
  • 1 篇 lope
  • 1 篇 fault tolerance
  • 1 篇 confidential com...
  • 1 篇 special secure m...
  • 1 篇 remote data inte...

机构

  • 1 篇 northwestern mut...
  • 1 篇 hp inc. usa
  • 1 篇 school of comput...
  • 1 篇 blockchain lab i...
  • 1 篇 college of intel...
  • 1 篇 computing center...
  • 1 篇 tianjin key labo...
  • 1 篇 national univers...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 information engi...
  • 1 篇 school of softwa...
  • 1 篇 school of softwa...

作者

  • 1 篇 xu guoming
  • 1 篇 abdul rehman
  • 1 篇 zhang tong
  • 1 篇 shen jiajun
  • 1 篇 chen keke
  • 1 篇 zhong xiaomei
  • 1 篇 li keqiu
  • 1 篇 zhang hanwen
  • 1 篇 xia liang
  • 1 篇 wang shengbao
  • 1 篇 sharma sagar
  • 1 篇 zhang mengyu
  • 1 篇 xiao meihua
  • 1 篇 ding donghui
  • 1 篇 xu wenting
  • 1 篇 luo yunxian
  • 1 篇 祝跃飞
  • 1 篇 yang ke
  • 1 篇 光焱
  • 1 篇 he zhengyuan

语言

  • 6 篇 英文
  • 1 篇 中文
检索条件"主题词=cryptographic protocols"
7 条 记 录,以下是1-10 订阅
排序:
Game-Based Automated Security Proofs for cryptographic protocols
收藏 引用
China Communications 2011年 第4期8卷 50-57页
作者: 顾纯祥 光焱 祝跃飞 Information Engineering College Information Engineering University
Provable security has become a popular approach for analyzing the security of cryptographic ***,writing and verifying proofs by hand are prone to *** paper advocates the automatic security proof framework with sequenc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation
收藏 引用
Chinese Journal of Electronics 2021年 第3期30卷 489-499页
作者: Abdul Rehman LIU Jian Muhammad Qasim Yasin LI Keqiu College of Intelligence and Computing Tianjin University Tianjin Key Laboratory of Advance Networking National University of Modern Languages Faisalabad Campus
In recent decades, a number of protocols for Remote data integrity checking(RDIC) have been proposed. Identity(ID) based RDIC protocols are constructed to guarantee cloud data integrity and data privacy. The known pro... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
LOPE: A Low-Overhead Payment Verification Method for Blockchains
收藏 引用
Chinese Journal of Electronics 2021年 第2期30卷 349-358页
作者: ZHANG Ying HE Zhengyuan JIA Linpeng DING Donghui ZHANG Hanwen SUN Yi School of Software Engineering Tongji University Blockchain Lab Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences
With its characteristics of decentralization,security, data traceability, and tamper-resistance, the blockchain has been widely used in various *** the difference in the performance of the devices, the light client is... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Proving Mutual Authentication Property of RCIA Protocol in RFID Based on Logic of Events
收藏 引用
Chinese Journal of Electronics 2022年 第1期31卷 79-88页
作者: ZHONG Xiaomei XIAO Meihua ZHANG Tong YANG Ke LUO Yunxian School of Software East China Jiaotong University
The increasing commercialization and massive deployment of radio frequency identification(RFID) systems has raised many security related issues which in return evokes the need of security protocols. Logic of events th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure Scalar Product protocols
收藏 引用
Chinese Journal of Electronics 2021年 第6期30卷 1059-1068页
作者: LI Shundong ZHANG Mengyu XU Wenting School of Computer Science Shaanxi Normal University
Secure scalar product computation is a special secure multi-party computation problem. A secure scalar product protocol can be used by two parties to jointly compute the scalar product of their private vectors without... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Confidential machine learning on untrusted platforms:a survey
收藏 引用
Cybersecurity 2021年 第1期4卷 461-479页
作者: Sharma Sagar Chen Keke Northwestern Mutual Data Science Associate Professor Director of Trustworthy and Intelligent Computing Lab Department of Computer Science Marquette University Milwaukee WisconsinUSA HP Inc. USA
With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)fo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Breaking and Repairing the Certificateless Key Agreement Protocol from ASIAN 2006
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第5期13卷 562-566页
作者: XIA Liang WANG Shengbao SHEN Jiajun XU Guoming Computing Center Artillery Academy of PLA Hefei230031 Anhui China Department of Computer Science and Engineering ShanghaiJiao Tong University Shanghai 200030 China
The certificateless authenticated key agreement protocol proposed by Mandt et al does not haVE the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论