咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 计算机科学与技术...
    • 4 篇 网络空间安全
    • 2 篇 材料科学与工程(可...
    • 2 篇 信息与通信工程
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 3 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 2 篇 天文学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 6 篇 key agreement pr...
  • 1 篇 quantum computin...
  • 1 篇 sm algorithm
  • 1 篇 artin group
  • 1 篇 small integer so...
  • 1 篇 lattice
  • 1 篇 hybrid encryptio...
  • 1 篇 combinatorial gr...
  • 1 篇 scyther
  • 1 篇 chebyshev polyno...
  • 1 篇 trusted server
  • 1 篇 strong security
  • 1 篇 privacy protecti...
  • 1 篇 tele-medical
  • 1 篇 perfect forward ...
  • 1 篇 genomic data
  • 1 篇 authentication
  • 1 篇 extended chaotic...
  • 1 篇 security
  • 1 篇 public key crypt...

机构

  • 1 篇 school of comput...
  • 1 篇 faculty of elect...
  • 1 篇 department of cr...
  • 1 篇 department of in...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 department of el...
  • 1 篇 school of cyber ...
  • 1 篇 school of teleco...
  • 1 篇 college of compu...

作者

  • 1 篇 seyed amin hosse...
  • 1 篇 栾大朋
  • 1 篇 zhang yaze
  • 1 篇 yang yatao
  • 1 篇 舒剑
  • 1 篇 tang xueming wan...
  • 1 篇 rahmat budiarto
  • 1 篇 huang jierun
  • 1 篇 jianwei liu
  • 1 篇 tao shang
  • 1 篇 王兴元
  • 1 篇 yatong jiang
  • 1 篇 zhang juanmei
  • 1 篇 mahdi nikooghada...

语言

  • 6 篇 英文
检索条件"主题词=key agreement protocol"
6 条 记 录,以下是1-10 订阅
排序:
An efficient three-party password-based key agreement protocol using extended chaotic maps
收藏 引用
Chinese Physics B 2015年 第6期24卷 231-238页
作者: 舒剑 Department of Electronic Commerce Jiangxi University of Finance and Economics School of Computer Science and Engineering University of Electronic Science and Technology of China
Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Att... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A secure key agreement protocol based on chaotic maps
收藏 引用
Chinese Physics B 2013年 第11期22卷 239-243页
作者: 王兴元 栾大朋 Faculty of Electronic Information and Electrical Engineering Dalian University of Technology
To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. I... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Improved authenticated key agreement protocol based on Bi-ISIS problem
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2020年 第3期27卷 93-102页
作者: Yang Yatao Zhang Juanmei Huang Jierun Zhang Yaze Department of Electronic and Communication Engineering Beijing Electronic Science and Technology InstituteBeijing 100070China Department of Cryptography Science and Technology Beijing Electronic Science and Technology InstituteBeijing 100070China School of Telecommunication Engineering Xidian UniversityXi'an 710071China
In the post quantum era,public key cryptographic scheme based on lattice is considered to be the most promising cryptosystem that can resist quantum computer ***,there are still few efficient key agreement protocols b... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient Lightweight Authentication and key agreement protocol for Patient Privacy
收藏 引用
Computers, Materials & Continua 2021年 第12期69卷 3495-3512页
作者: Seyed Amin Hosseini Seno Mahdi Nikooghadam Rahmat Budiarto Department of Computer Engineering Ferdowsi University of MashhadMashhad***Iran Department of Informatics Faculty of Science and TechnologyUniversitas Alazhar IndonesiaJakarta12110Indonesia
Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical *** this system,service providers consider user authentication as a critical *** ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SM algorithms-based encryption scheme for large genomic data files
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 543-550页
作者: Yatong Jiang Tao Shang Jianwei Liu School of Cyber Science and Technology Beihang UniversityBeijing100083China
With the rapid development of the genomic sequencing technology,the cost of obtaining personal genomic data and effectively analyzing it has been gradually *** analysis and utilization of genomic dam gradually entered... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
New Public key Cryptosystems from Combinatorial Group Theory
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第5期11卷 1267-1270页
作者: TANG Xueming WANG Xiaofei HONG Fan CUI Guohua College of Computer Science and Technology HuazhongUniversity of Science and Technology Wuhan 430074Hubei China
External direct product of some low layer groups such as braid groups and general Artin groups, with a kind of special group action on it, provides a secure cryptographic computation platform, which can keep secure in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论