咨询与建议

限定检索结果

文献类型

  • 203 篇 期刊文献
  • 158 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 362 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 334 篇 工学
    • 261 篇 计算机科学与技术...
    • 130 篇 电气工程
    • 115 篇 信息与通信工程
    • 62 篇 软件工程
    • 29 篇 电子科学与技术(可...
    • 24 篇 网络空间安全
    • 12 篇 仪器科学与技术
    • 9 篇 控制科学与工程
    • 7 篇 机械工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 45 篇 理学
    • 34 篇 数学
    • 9 篇 化学
    • 6 篇 生物学
    • 2 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
  • 8 篇 军事学
    • 8 篇 军队指挥学
  • 5 篇 法学
    • 4 篇 法学
    • 1 篇 社会学
  • 4 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 362 篇 identity-based c...
  • 41 篇 security
  • 23 篇 authentication
  • 23 篇 random oracle mo...
  • 23 篇 provable securit...
  • 21 篇 bilinear pairing
  • 21 篇 signcryption
  • 20 篇 bilinear pairing...
  • 20 篇 cryptography
  • 19 篇 privacy
  • 17 篇 cloud storage
  • 16 篇 cloud computing
  • 15 篇 key agreement
  • 14 篇 digital signatur...
  • 14 篇 public key
  • 13 篇 standard model
  • 12 篇 internet of thin...
  • 12 篇 blockchain
  • 12 篇 anonymity
  • 11 篇 public key crypt...

机构

  • 17 篇 univ elect sci &...
  • 5 篇 shandong univ sc...
  • 5 篇 shaanxi normal u...
  • 5 篇 city univ hong k...
  • 4 篇 guizhou normal u...
  • 4 篇 chinese acad sci...
  • 4 篇 chinese acad sci...
  • 4 篇 wuhan univ comp ...
  • 4 篇 hangzhou normal ...
  • 4 篇 qingdao univ col...
  • 4 篇 cr rao adv inst ...
  • 4 篇 guizhou normal u...
  • 4 篇 guizhou normal u...
  • 3 篇 school of comput...
  • 3 篇 city univ hong k...
  • 3 篇 nanjing univ pos...
  • 3 篇 tsinghua univ de...
  • 3 篇 kyushu univ fac ...
  • 3 篇 changsha univ sc...
  • 3 篇 xian univ archit...

作者

  • 17 篇 li fagen
  • 8 篇 deng lunzhi
  • 7 篇 jin chunhua
  • 7 篇 he debiao
  • 7 篇 wang huaqun
  • 6 篇 yang guomin
  • 6 篇 wong duncan s.
  • 6 篇 saraswat vishal
  • 6 篇 xu chunxiang
  • 6 篇 xu qiuliang
  • 6 篇 gupta daya sagar
  • 6 篇 islam s. k. hafi...
  • 6 篇 sahu rajeev anan...
  • 5 篇 yu jia
  • 5 篇 chen kefei
  • 5 篇 takagi tsuyoshi
  • 5 篇 mu yi
  • 5 篇 peng su
  • 5 篇 susilo willy
  • 4 篇 xu zifeng

语言

  • 351 篇 英文
  • 9 篇 其他
  • 2 篇 中文
检索条件"主题词=identity-based cryptography"
362 条 记 录,以下是1-10 订阅
排序:
A Blockchain Network Admission Control Mechanism Using Anonymous identity-based cryptography
收藏 引用
APPLIED SCIENCES-BASEL 2025年 第1期15卷
作者: Zhang, Haibao Jiang, Wenbao Ding, Jin Beijing Infomat Sci & Technol Univ Dept Informat Secur Beijing 100192 Peoples R China
Permissioned blockchains are increasingly used in areas like supply chain management, financial transactions, and medical data sharing, where ensuring data consistency and security is critical. However, these systems ... 详细信息
来源: 评论
identity-based cryptography for grid security
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2011年 第1期10卷 15-32页
作者: Lim, Hoon Wei Paterson, Kenneth G. Nanyang Technol Univ Coding & Cryptog Res Grp Singapore Singapore Univ London Informat Secur Grp London England
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. identity-based cryptog... 详细信息
来源: 评论
E-passport EAC scheme based on identity-based cryptography
收藏 引用
INFORMATION PROCESSING LETTERS 2010年 第1期111卷 26-30页
作者: Li, C. H. Zhang, X. F. Jin, H. Xiang, W. Huazhong Univ Sci & Technol Sch Comp Sci & Technol Wuhan 430074 Peoples R China
Extended Access Control (EAC) is a security mechanism specified to allow only authorized Inspection System (IS) to read sensitive biometric data such as fingerprints from e-passports. Although European Union EAC schem... 详细信息
来源: 评论
A Survey of Applications of identity-based cryptography in Mobile Ad-Hoc Networks
收藏 引用
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS 2012年 第2期14卷 380-400页
作者: Zhao, Shushan Aggarwal, Akshai Frost, Richard Bai, Xiaole Univ Windsor Sch Comp Sci Windsor ON N9B 3P4 Canada Univ Massachusetts Dept Comp & Informat Sci Dartmouth MA USA
Security in mobile ad-hoc networks (MANETs) continues to attract attention after years of research. Recent advances in identity-based cryptography (IBC) sheds light on this problem and has become popular as a solution... 详细信息
来源: 评论
Security and Privacy Schemes in Vehicular Ad-Hoc Network With identity-based cryptography Approach: A Survey
收藏 引用
IEEE ACCESS 2021年 9卷 121522-121531页
作者: Al-Shareeda, Mahmood A. Anbar, Mohammed Manickam, Selvakumar Khalil, Ayman Hasbullah, Iznan Husainy Univ Sains Malaysia USM Natl Adv IPv6 Ctr NAv6 Gelugor 11800 Penang Malaysia Islamic Univ Lebanon IUL Fac Engn Beirut 30014 Lebanon
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues. Many researchers have suggested various ... 详细信息
来源: 评论
Secure mobile communication via identity-based cryptography and server-aided computations
收藏 引用
JOURNAL OF SUPERCOMPUTING 2011年 第2期55卷 284-306页
作者: Smith, Matthew Schridde, Christian Agel, Bjoern Freisleben, Bernd Univ Marburg Dept Math & Comp Sci D-35032 Marburg Germany
In this paper, an identity-based key agreement protocol for securing mobile telephony in GSM and UMTS networks is presented. The approach allows two mobile phones to perform a session key agreement over an unsecured c... 详细信息
来源: 评论
Body Sensor Network Security: An identity-based cryptography Approach  08
Body Sensor Network Security: An Identity-Based Cryptography...
收藏 引用
1st ACM Conference on Wireless Network Security
作者: Tan, Chiu C. Wang, Haodong Zhong, Sheng Li, Qun Coll William & Mary Williamsburg VA 23187 USA
A body sensor network (BSN), is a network of sensors deployed on a person's body, usually for health care monitoring. Since the sensors collect personal medical data, security and privacy are important components ... 详细信息
来源: 评论
Applicability of identity-based cryptography for Disruption-Tolerant Networking
Applicability of Identity-Based Cryptography for Disruption-...
收藏 引用
1st International MobiSys Workshop on Mobile Opportunistic Networking
作者: Asokan, N. Kostiainen, Kari Ginzboorg, Philip Ott, Joerg Luo, Cheng Nokia Research Center Helsinki University of Technology Finland
Traditional approaches for communication security do not work well in disruption- and delay-tolerant networks (DTNs). Recently, the use of identity-based cryptography (IBC) has been proposed as one way to help solve s... 详细信息
来源: 评论
Improved TLS Handshake Protocols Using identity-based cryptography
Improved TLS Handshake Protocols Using Identity-based Crypto...
收藏 引用
1st International Symposium on Information Engineering and Electronic Commerce
作者: Peng, Changyan Zhang, Quan Tang, Chaojing Natl Univ Def Technol Sch Elect Sci & Engn Changsha Hunan Peoples R China
Transport layer security (TLS) protocol is widely used in e-business and information systems for providing security attributes such as authentication, confidentiality and integrity. However, the certificate-based mech... 详细信息
来源: 评论
Secure V2V Communication with identity-based cryptography from License Plate Recognition  6
Secure V2V Communication with Identity-based Cryptography fr...
收藏 引用
6th International Conference on Internet of Things - Systems, Management and Security (IOTSMS)
作者: Andreica, Tudor Groza, Bogdan Politehn Univ Timisoara Fac Automat & Comp Timisoara Romania
The deployment of secure vehicle-to-vehicle communication is essential for recent technologies such as autonomous driving and traffic optimizations. In this paper we experiment with the use of license plates as a mean... 详细信息
来源: 评论