咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 12 篇 网络空间安全
    • 8 篇 计算机科学与技术...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 13 篇 forward security
  • 2 篇 identity based
  • 2 篇 signcryption
  • 1 篇 relatively few p...
  • 1 篇 bilinear pairing
  • 1 篇 file-injection a...
  • 1 篇 order-revealing ...
  • 1 篇 elliptic curve c...
  • 1 篇 shortest vector ...
  • 1 篇 two-party secure...
  • 1 篇 sign independent...
  • 1 篇 key sharing atta...
  • 1 篇 zero knowledge
  • 1 篇 non-repudiation
  • 1 篇 key agreement
  • 1 篇 internet proxy
  • 1 篇 data encryption
  • 1 篇 authentication
  • 1 篇 rsa
  • 1 篇 threshold signat...

机构

  • 1 篇 school of comput...
  • 1 篇 inst. of network...
  • 1 篇 mathematics depa...
  • 1 篇 departmentofcomp...
  • 1 篇 state key labora...
  • 1 篇 college of infor...
  • 1 篇 state key labora...
  • 1 篇 school of inform...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 college of mathe...
  • 1 篇 institute of phy...
  • 1 篇 school of mathem...
  • 1 篇 computer science...
  • 1 篇 anhui engineerin...
  • 1 篇 key laboratory o...
  • 1 篇 school of comput...
  • 1 篇 nanjing universi...
  • 1 篇 state key labora...
  • 1 篇 state key labora...

作者

  • 1 篇 miaomiao tian
  • 1 篇 li yanping
  • 1 篇 jie cui
  • 1 篇 wang yumin
  • 1 篇 cheng qingfeng
  • 1 篇 yu jia
  • 1 篇 santi martínez
  • 1 篇 lin huang
  • 1 篇 朱博
  • 1 篇 hao rong
  • 1 篇 si guangdong
  • 1 篇 yun-lei zhao
  • 1 篇 李大兴
  • 1 篇 周耀伟
  • 1 篇 concepció roig
  • 1 篇 kong fanyu
  • 1 篇 likun jia
  • 1 篇 孔凡玉
  • 1 篇 feifei-yu chenwe...
  • 1 篇 xing-chen wang

语言

  • 13 篇 英文
检索条件"主题词=forward security"
13 条 记 录,以下是1-10 订阅
排序:
Order-Revealing Encryption:File-Injection Attack and forward security
收藏 引用
Journal of Computer Science & Technology 2021年 第4期36卷 877-895页
作者: Yuan Li Xing-Chen Wang Lin Huang Yun-Lei Zhao School of Computer Science Fudan UniversityShanghai 201203China State Key Laboratory of Integrated Services Networks Xidian UniversityXi’an 710071China State Key Laboratory of Cryptology Beijing 100878China
Order-preserving encryption(OPE)and order-revealing encryption(ORE)are among the core ingredients for encrypted databases(EDBs).In this work,we study the leakage of OPE and ORE and their forward *** propose generic ye... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient Identity Based Signcryption Scheme with Public Verifiability and forward security
收藏 引用
Wuhan University Journal of Natural Sciences 2005年 第1期10卷 248-250页
作者: FEIFei-yu CHENWen CHENKe-fei MAChang-she DepartmentofComputerScienceandEngineering ShanghaiJiaotongUniversityShanghai200030China
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over ell... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient ldentity Based Signcryption Scheme with Public Verifiability and forward security
Efficient ldentity Based Signcryption Scheme with Public Ver...
收藏 引用
The 1st Chinese Conference on Trusted Computing and Information security
作者: LEI Fei-yu, CHEN Wen, CHEN Ke-fei,MA Chang-she Department of Computer Science and Engineering. Shanghai Jiaotong University, Shanghai 200030,China
<正> In this paper, we point out that Libert and Quisquater’s signeryption scheme cannot provide public *** we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic cur... 详细信息
来源: cnki会议 评论
LaTLS: A Lattice-Based TLS Proxy Protocol
收藏 引用
Chinese Journal of Electronics 2022年 第2期31卷 313-321页
作者: ZHANG Xinglong CHENG Qingfeng LI Yuting State Key Laboratory of Mathematical Engineering and Advanced Computing
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two-party secure communication protocol with good security is turned into an unsafe multiparty prot... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Secure Elliptic Curve-Based RFID Protocol
收藏 引用
Journal of Computer Science & Technology 2009年 第2期24卷 309-318页
作者: Santi Martínez Magda Valls Concepció Roig Josep M. Miret Francesc Giné Computer Science Department Universitat de Lleida Mathematics Department Universitat de Lleida
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Key-insulated encryption based group key management for wireless sensor network
收藏 引用
Journal of Central South University 2013年 第5期20卷 1277-1284页
作者: 邱卫东 周耀伟 朱博 郑燕飞 龚征 School of Information security Engineering Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai Jiao Tong University School of Computer Science South China Normal University
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
forward and backward secure searchable encryption with multi-keyword search and result verification
收藏 引用
Science China(Information Sciences) 2022年 第5期65卷 270-272页
作者: Jie CUI Yue SUN Yan XU Miaomiao TIAN Hong ZHONG School of Computer Science and Technology Anhui University Institute of Physical Science and Information Technology Anhui University Anhui Engineering Laboratory of LoT security Technologies Anhui University
Dear editor,Searchable encryption [1] is a new search method that not only protects personal privacy, but also searches over encrypted data. The multi-keyword scheme can search documents with more keywords so that the... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Set signatures and their applications
收藏 引用
Science in China(Series F) 2009年 第8期52卷 1346-1357页
作者: WU ChuanKun State Key Laboratory of Information security Institute of Software Chinese Academy of Sciences Beijing 100190 China
There are many constraints in the use of digital signatures. This paper proposes a new way of using digital signatures with some restrictions, i.e. set signatures. It works in such a way that when the signing algorith... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient forward Secure Signature Scheme
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2006年 第2期11卷 242-247页
作者: 于佳 孔凡玉 李大兴 Inst. of Network security Shandong Univ. Jinan 250100 ChinaCollege of Information Eng. Qingdao Univ. Qingdao 266071) Inst. of Network security Shandong Univ. Jinan 250100 China
A new efficient forward secure signature scheme based on bilinear pairings is presented m this paper. Each complexity of key generation, key update, signing and verifying algorithms in this scheme is O(1) in terms o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A New forward-Secure Authenticated Encryption Scheme with Message Linkages
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1537-1540页
作者: LI Yanping SI Guangdong WANG Yumin Key Laboratory of Computer Networks and Information security Ministry of Education Xidian University Xi'an 710071 Shaanxi China College of Mathematics and Information Science Shaanxi Normal University Xi'an 710062 Shaanxi China
Yoon and Yoo recently proposed a robust authenticated encryption scheme and claimed their scheme has the properties of forward secrecy and confidentiality. The current paper, however, points out that Yoon-Yoo's schem... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论