欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
期刊
> 期刊详情页
Secure identity-based ad hoc protocols for mobile networks
ISSN号:1881-803X
期刊名称:Icic Express Letters
时间:0
页码:293-298
相关项目:新型公钥广播加密的设计与分析
作者:
Zhang, Leyou1|Hu, Yupu2|Wu, Qing3|
同期刊论文项目
新型公钥广播加密的设计与分析
期刊论文 68
会议论文 10
同项目期刊论文
A new certificateless broadcast signcryption
双系统密码技术下的身份型广播加密方案
Lattice-based signature scheme in the standard model
Fully secure attribute-based broadcast encryption
不可能差分分析8轮AES-256
Lattice-based strong designate verifier signature and its applications
A lattice-based ring signature scheme from bonsai trees
Identity-based Threshold Broadcast Encryption in the Standard Model
Lattice-based blind signature schemes
Weakness in Projected C star- Scheme
Adaptively secure hierarchical identity-based signature in the standard model
Algebraic cube attack on Sfinks stream cipher
A New Method for Meet-in-the-Middle Attacks on Reduced AES
A new construction of short hierarchical identity-based signature in the standard model
Provably secure multi-proxy signature scheme with revocation in the standard model
Identity-based broadcast encryption scheme using the new techniques for dual system encryption
A verifiably encrypted signature scheme from lattice assumption
New constructions of short signatures in the standard model
New identity-based broadcast encryption with constant ciphertexts in the standard model
Lattice-based oblivious transfer protocol
Provable secure hierarchical identity based signature scheme in the standard model
Short signature in the standard model
Fully Secure Identity-based Broadcast Encryption in the Subgroups
Autocorrelation of Sequences Generated by Single Cycle T-Functions
New Constructions of Identity-based Broadcast Encryption without Random Oracles
Direct Chosen-Ciphertext-Attack Hierarchical Computing Technique for Identity-based Encrption
标准模型下的格基数字签名方案
Direct chosen-ciphertext technique for identity-based broadcast encryption
Hierarchical Identity-Based Encryption with Constant-Size Private Keys
Post-Quantum Secure Hybrid Signcryption from Lattice Assumption
CCA2 Secure Biometric Identity Based Encryption with Constant-size Ciphertext
Fuzzy attribute-identification techniques for be in the standard model
一种高效的无证书公钥移动IP注册协议
Efficient Dynamic Data Encryption Algorithm for Mobile Ad Hoc Network
完全安全的基于属性的广播加密方案
CCA-secure unidirectional proxy broadcast re-encryption in the standard model
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertext
Unbounded Hierarchical Identity-based Encryption in the Standard Model
Improved cryptanalysis of the VMPC stream cipher
具有细粒度访问控制的隐藏关键词可搜索加密方案
具有短公开参数的基于分级身份的签名方案
一种RMPKC体制的改进方案
投影对C*-体制对称性的破坏
标准模型下基于身份的具有部分消息恢复功能的签名方案
多变量公钥密码中等价密钥问题
格上新的身份类广播加密方案
格基不经意传输协议
基于格的盲签名方案
标准模型下一种新的基于分级身份的短签名方案
多变量公钥密码体制等价密钥分析
子群中完全安全的基于身份的广播加密(英文)
针对流密码HC-256'的区分攻击
抗选择性公开攻击的身份型广播加密方案
一种新的无证书广播签密方案
流密码Sosemanuk的区分攻击.
7轮AES-128的非对称不可能飞来器攻击
具有前向安全性和公开可验证性的签密方案
一种新的简化AES中间相遇攻击方法(英文)
单圈T函数生成序列的自相关性(英文)
New Constructions of Identity-Based Threshold Decryption
Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model