咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 软件工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 信息与通信工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
  • 1 篇 文学
    • 1 篇 外国语言文学

主题

  • 7 篇 digital signatur...
  • 3 篇 data security
  • 2 篇 cryptography
  • 1 篇 rank metric
  • 1 篇 deep learning
  • 1 篇 wireless communi...
  • 1 篇 standardization
  • 1 篇 aggregate extrac...
  • 1 篇 model
  • 1 篇 hierarchical ide...
  • 1 篇 blockchain
  • 1 篇 vehicular ad hoc...
  • 1 篇 artificial intel...
  • 1 篇 sequential aggre...
  • 1 篇 post-quantum cry...
  • 1 篇 privacy protecti...
  • 1 篇 ad hoc networks
  • 1 篇 intelligent vehi...
  • 1 篇 chameleon hashes
  • 1 篇 private informat...

机构

  • 1 篇 school of mathem...
  • 1 篇 school of manage...
  • 1 篇 college of compu...
  • 1 篇 fujian provincia...
  • 1 篇 zurich research ...
  • 1 篇 department of cy...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 school of scienc...
  • 1 篇 department of el...
  • 1 篇 school of engine...
  • 1 篇 school of cybers...

作者

  • 2 篇 yongcheng song
  • 2 篇 wei wu
  • 1 篇 nour moustafa
  • 1 篇 junpeng xu
  • 1 篇 mohiuddin ahmed
  • 1 篇 a.f.m.shahen sha...
  • 1 篇 zhai jiaqi
  • 1 篇 vadim lyubashevs...
  • 1 篇 xu yang
  • 1 篇 alex mathew
  • 1 篇 ahmet zengin
  • 1 篇 pingshui wang
  • 1 篇 willy susilo
  • 1 篇 yi mu
  • 1 篇 a.f.m.suaib akht...
  • 1 篇 xinyi huang
  • 1 篇 chen lusheng
  • 1 篇 liu jian
  • 1 篇 unalçavu¸soglu
  • 1 篇 haixia chen

语言

  • 7 篇 英文
检索条件"主题词=digital signatures"
7 条 记 录,以下是1-10 订阅
排序:
Lattice-based digital signatures
收藏 引用
National Science Review 2021年 第9期8卷 9-10页
作者: Vadim Lyubashevsky Zurich Research Laboratory IBM Research
digital signatures and key exchange protocols are the two most important public key cryptographic primitives used in the electronic transmission of data. The goal of key exchange is to preserve the secrecy of the comm... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Extraction Security of Sequential Aggregate signatures
收藏 引用
Chinese Journal of Electronics 2021年 第5期30卷 885-894页
作者: ZHAI Jiaqi LIU Jian CHEN Lusheng School of Mathematical Sciences Nankai University School of Cybersecurity College of Intelligence and ComputingTianjin University
Aggregate signature schemes enable anyone to compress many signatures into one.Besides the unforgeability of aggregate signature,another property called aggregate extraction sometimes is useful.In sequential aggregate... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An improved Durandal signature scheme
收藏 引用
Science China(Information Sciences) 2020年 第3期63卷 140-155页
作者: Yongcheng SONG Xinyi HUANG Yi MU Wei WU Fujian Provincial Key Laboratory of Network Security and Cryptology College of Mathematics and InformaticsFujian Normal University
Constructing secure and effective code-based signature schemes has been an open problem. In this paper, we efficiently reduce the key size of the Durandal signature scheme introduced by Aragon et al.(EUROCRYPT 2019). ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Verifiable image revision from chameleon hashes
收藏 引用
Cybersecurity 2021年 第1期4卷 528-540页
作者: Junpeng Xu Haixia Chen Xu Yang Wei Wu Yongcheng Song College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina
In a digital society,the rapid development of computer science and the Internet has greatly facilitated image applications.However,one of the public network also brings risks to both image tampering and privacy exposu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Data Security Storage Model of the Internet of Things Based on Blockchain
收藏 引用
Computer Systems Science & Engineering 2021年 第1期36卷 213-224页
作者: Pingshui Wang Willy Susilo School of Management Science and Engineering Anhui University of Finance and EconomicsBengbu233030China School of Computing and Information Technology University of WollongongWollongong2522Australia
With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 229-246页
作者: A.F.M.Suaib Akhter A.F.M.Shahen Shah Mohiuddin Ahmed Nour Moustafa UnalÇavu¸soglu Ahmet Zengin Department of Computer Engineering Sakarya UniversitySakarya54050Turkey Department of Electrical and Electronics Engineering Istanbul Gelisim UniversityIstanbulTurkey School of Science Edith Cowan UniversityPerthWA6027Australia School of Engineering and Information Technology UNSWCanberra BC2610Australia
Vehicular Ad hoc Networks(VANETs)become a very crucial addition in the Intelligent Transportation System(ITS).It is challenging for a VANET system to provide security services and parallelly maintain high throughput b... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Human-Centered A.I. and Security Primitives
收藏 引用
Journal of Computer Science Research 2020年 第4期2卷 32-35页
作者: Alex Mathew Department of Cybersecurity Bethany CollegeUSA
The paper reviews how human-centered artificial intelligence and securityprimitive have influenced life in the modern world and how it’s useful inthe future. Human-centered A.I. has enhanced our capabilities by the w... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论