欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
所属机构名称:北京大学
会议名称:5th ACM Symposium on Information, Computer, and Communications security, ACM AisaCCS 2010
时间:2010
成果类型:会议
相关项目:信息处理中的关键数学问题
作者:
Y. Zhu|G. Ahn|H. Hu|H. Wang|
同会议论文项目
信息处理中的关键数学问题
期刊论文 199
会议论文 50
著作 3
同项目会议论文
An alternative derivation for Bronnikov's reconstruction formula in x-ray phase contrast tomogra
常平均曲率细分曲面的构造
Strong Unforgeability in Ring Signature Schemes
A Class of Elliptic Curves in Edwards Form
Collaborative Integrity Verification in Hybrid Clouds
A New Family of Quadriphase Sequences with Low Correlation
Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One
Solving the single rate 2-pair network coding problem with the A-set equation
Quality multi-domain meshing for volumetric data
An improved color image demosaicking algorithm
Dynamic Texture Analysis using Eigenvectors of Gradient Skewness Tensors
保特征散乱数据的曲面重构----变分水平集方法
Linear recurring sequences and subfield subcodes
Construction of minimal Catmull-Clark's subdivision surfaces with given boundaries
Construction of Subdivision Surfaces by Fourth-Order Geometric Flows with G(1) Boundary Conditions
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem
Secure Data Retrieval of Outsourced Data with Complex Query Support
Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices
A novel geometric flow-driven approach for quality improvement of segmented tetrahedral meshes
A new model of binary elliptic curves
An improved algorithm for computing 2P Q on elliptic curves
Towards Temporal Access Control in Cloud Computing
Geometric quantization on noncompact manifolds
Flexible alignment of images using B-spline reparameterization and L 2-gradient flows
Electric-potential reconstructions of single particles using L 2-gradient flows
A new reconstruction algorithm in tomography with geometric feature-preserving regularization
Differential Fault Attack on the PRINCE Block Cipher
Efficient self-pairing on ordinary elliptic curves
Super-optimal pairings
Incorrigible Set Distributions and Unsuccessful Decoding Probability of Linear Codes
Enabling Secure Location-based Services in Mobile Cloud Computing
How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud
Cryptographic Spatio-Temporal Predicates for Location-based Services
Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key Cryptosystem
Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
High order total variation method for interior tomography
A Novel Identity Based Undeniable Signature Scheme
A robust 2-refinement algorithm in octree and rhombic dodecahedral tree based all-hexahedral mesh ge
On the isomorphism classes of elliptic curves with 2-torsion points
A generalization of Verheul's theorem for some ordinary curves
Universal network error correction MDS codes
Efficient identity-based encryption without pairings and key escrow for mobile devices
On the number of isomorphism classes of elliptic curves with 2-torsion points over finite fields
End-to-End Aggregate Authentication of Time-Series Data
A kind of cyclotomic numbers and Sidelnikov sequences
Twisted Jacobi intersections curves
The encoding complexity of network coding with two simple multicast sessions
Cube Cryptanalysis of Hitag2 Stream Cipher
Solving the two simple multicast network coding problem in time O(E)