咨询与建议

限定检索结果

文献类型

  • 12 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 10 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 机械工程
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 物理学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 18 篇 signature algori...
  • 4 篇 digital signatur...
  • 3 篇 scheme
  • 2 篇 signatures
  • 2 篇 algorithms
  • 2 篇 internets
  • 2 篇 cryptography
  • 2 篇 secure
  • 1 篇 dedicated physic...
  • 1 篇 internet of thin...
  • 1 篇 aggregates
  • 1 篇 gain
  • 1 篇 peers
  • 1 篇 rank metric
  • 1 篇 public key crypt...
  • 1 篇 tracking managem...
  • 1 篇 echo
  • 1 篇 statistical test...
  • 1 篇 topic signature
  • 1 篇 mobile agents

机构

  • 2 篇 univ waterloo de...
  • 1 篇 nanyang technol ...
  • 1 篇 beijing univ tec...
  • 1 篇 key laboratory o...
  • 1 篇 univ bordeaux in...
  • 1 篇 acad sinica inst...
  • 1 篇 beijing jiaotong...
  • 1 篇 tongji univ sch ...
  • 1 篇 tongji univ sch ...
  • 1 篇 peking univ sch ...
  • 1 篇 beihang univ sta...
  • 1 篇 acad sinica grad...
  • 1 篇 chinese acad sci...
  • 1 篇 inrs-emt univers...
  • 1 篇 univ waterloo da...
  • 1 篇 univ limoges xli...
  • 1 篇 chonbuk natl uni...
  • 1 篇 institute of inf...
  • 1 篇 military technic...
  • 1 篇 guangdong power ...

作者

  • 1 篇 yaosong lu
  • 1 篇 su shenghui
  • 1 篇 wuqiang shen
  • 1 篇 donghe ni
  • 1 篇 wu guohua
  • 1 篇 gaborit philippe
  • 1 篇 liu tianhao
  • 1 篇 ye df
  • 1 篇 ruigang liang
  • 1 篇 chang xiaolin
  • 1 篇 ho pin-han
  • 1 篇 xiaoquan chen an...
  • 1 篇 ruatta olivier
  • 1 篇 li lun
  • 1 篇 chen chen
  • 1 篇 liu ming
  • 1 篇 xiang li
  • 1 篇 he guangqiang
  • 1 篇 guo ying
  • 1 篇 eweda e

语言

  • 17 篇 英文
  • 1 篇 其他
检索条件"主题词=Signature algorithm"
18 条 记 录,以下是1-10 订阅
排序:
Continuous variable quantum signature algorithm
收藏 引用
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION 2007年 第4期5卷 553-573页
作者: Zeng, Guihua Lee, Moonho Guo, Ying He, Guangqiang Shanghai Jiao Tong Univ Lab Coding & Commun Secur Shanghai 200030 Peoples R China Chonbuk Natl Univ Inst Informat & Commun Dept Informat & Commun Engn Chonju 561756 South Korea
A true quantum signature algorithm based on continuous-variable entanglement state is proposed. In the suggested algorithm, a key-pair, i.e. private signature key and public verification key, is generated based on a o... 详细信息
来源: 评论
Performance Evaluation for the signature algorithm of ISDSR on Raspberry Pi  5
Performance Evaluation for the Signature Algorithm of ISDSR ...
收藏 引用
5th International Symposium on Computing and Networking (CANDAR)
作者: Kojima, Hideharu Yanai, Naoto Osaka Univ Grad Sch Informat Sci & Technol 1-5 Yamadaoka Suita Osaka Japan
Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each se... 详细信息
来源: 评论
RankSign: An Efficient signature algorithm Based on the Rank Metric
RankSign: An Efficient Signature Algorithm Based on the Rank...
收藏 引用
6th International Workshop on Post-Quantum Cryptography (PQCrypto)
作者: Gaborit, Philippe Ruatta, Olivier Schrek, Julien Zemor, Gilles Univ Limoges XLIM DMI 123 Av Albert Thomas F-87060 Limoges France Univ Bordeaux Inst Math emat UMR 5251 Bordeaux France
In this paper we propose a new approach to code-based signatures that makes use in particular of rank metric codes. When the classical approach consists in finding the unique preimage of a syndrome through a decoding ... 详细信息
来源: 评论
Key-Insulated Undetachable Digital signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce
收藏 引用
MOBILE INFORMATION SYSTEMS 2016年 第Pt.3期2016卷 1-18页
作者: Shi, Yang Lin, Jie Xiong, Guoyue Wang, Xiaoping Fan, Hongfei Tongji Univ Sch Software Engn 4800 Caoan Highway Shanghai 201804 Peoples R China Tongji Univ Sch Econ & Management 4800 Caoan Highway Shanghai 201804 Peoples R China Tongji Univ Dept Comp Sci & Technol 4800 Caoan Highway Shanghai 201804 Peoples R China
Considering the security of both the customers' hosts and the eShops' servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital s... 详细信息
来源: 评论
Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach
收藏 引用
INFORMATION SCIENCES 2020年 509卷 290-303页
作者: Li, Lun Liu, Jiqiang Chang, Xiaolin Liu, Tianhao Liu, Jingxian Beijing Jiaotong Univ Beijing Key Lab Secur & Privacy Intelligent Trans 3 Shangyuancun Beijing 100044 Peoples R China Beijing Jiaotong Univ Sch Comp & Informat Technol 3 Shangyuancun Beijing 100044 Peoples R China
Bitcoin is being explored for applications in various Internet of Things (IoT) scenarios as a peer-to-peer payment platform. However, security and anonymity problems exist with Bitcoin, which threaten vulnerable IoT f... 详细信息
来源: 评论
AnonymousFox: An Efficient and Scalable Blockchain Consensus algorithm
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2022年 第23期9卷 24236-24252页
作者: Wan, Ji Hu, Kai Li, Jie Su, Hao Beihang Univ State Key Lab Software Dev Environm Beijing 100190 Peoples R China
Blockchain is an innovative application of distributed storage, consensus algorithm, encryption algorithm, and other computer technologies. The consensus algorithm is the key to keep consistent among blockchain nodes.... 详细信息
来源: 评论
ALMOST SURE CONVERGENCE OF A DECREASING GAIN SIGN algorithm FOR ADAPTIVE FILTERING
收藏 引用
IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING 1988年 第10期36卷 1669-1671页
作者: EWEDA, E Military Technical College Kobry El Kobba Cairo Egypt
The convergence analysis of a sign algorithm with decreasing gain, when governing the weights of an adaptive filter, is presented. The analysis is done in a noiseless case. A rigorous proof of almost-sure convergence ... 详细信息
来源: 评论
Cryptanalysis of Wang's original and revised digital signature scheme
收藏 引用
ELECTRONICS LETTERS 2001年 第4期37卷 220-220页
作者: Dai, ZD Yang, JH Ye, DF Gong, G Acad Sinica Grad Sch State Key Lab Informat Secur Beijing 100039 Peoples R China Univ Waterloo Dept Elect & Comp Engn Waterloo ON N2L 3G1 Canada Acad Sinica Inst Software Beijing 100080 Peoples R China
Wang's basic digital signature scheme and its new variation is cracked. The proposed signature forging algorithm makes no assumptions on operations of the schemes and is as efficient as the signing algorithm.
来源: 评论
Leakage Prevention Method for Unstructured Data Based on Classification  6th
Leakage Prevention Method for Unstructured Data Based on Cla...
收藏 引用
6th International Conference on Applications and Techniques in Information Security (ATIS)
作者: Li, Hao Peng, Zewu Feng, Xinyao Ma, Hongxia Guangdong Power Grid Corp Informat Ctr Guangzhou Guangdong Peoples R China Chinese Acad Sci Inst Informat Engn SKLOIS Beijing Peoples R China
There is often a lot of sensitive information in the unstructured data of enterprise information network, if not controlled, the sensitive data will flow from the Intranet to the Extranet, which can easily lead to dis... 详细信息
来源: 评论
Quantum algorithm for Polynomial Root Finding Problem  10
Quantum Algorithm for Polynomial Root Finding Problem
收藏 引用
10th International Conference on Computational Intelligence and Security CIS 2014
作者: Sun, Guodong Su, Shenghui Xu, Maozhi Beijing Univ Technol Coll Comp Sci Beijing Peoples R China Peking Univ Sch Math Sci Beijing Peoples R China
Quantum computation is a new computing model based on fundamental quantum mechanical principle. Grover's algorithm finds the solution for a searching problem in the square root time of exhaustive search. Brassard,... 详细信息
来源: 评论