咨询与建议

限定检索结果

文献类型

  • 12 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 10 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 机械工程
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 物理学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 18 篇 signature algori...
  • 4 篇 digital signatur...
  • 3 篇 scheme
  • 2 篇 signatures
  • 2 篇 algorithms
  • 2 篇 internets
  • 2 篇 cryptography
  • 2 篇 secure
  • 1 篇 dedicated physic...
  • 1 篇 internet of thin...
  • 1 篇 aggregates
  • 1 篇 gain
  • 1 篇 peers
  • 1 篇 rank metric
  • 1 篇 public key crypt...
  • 1 篇 tracking managem...
  • 1 篇 echo
  • 1 篇 statistical test...
  • 1 篇 topic signature
  • 1 篇 mobile agents

机构

  • 2 篇 univ waterloo de...
  • 1 篇 nanyang technol ...
  • 1 篇 beijing univ tec...
  • 1 篇 key laboratory o...
  • 1 篇 univ bordeaux in...
  • 1 篇 acad sinica inst...
  • 1 篇 beijing jiaotong...
  • 1 篇 tongji univ sch ...
  • 1 篇 tongji univ sch ...
  • 1 篇 peking univ sch ...
  • 1 篇 beihang univ sta...
  • 1 篇 acad sinica grad...
  • 1 篇 chinese acad sci...
  • 1 篇 inrs-emt univers...
  • 1 篇 univ waterloo da...
  • 1 篇 univ limoges xli...
  • 1 篇 chonbuk natl uni...
  • 1 篇 institute of inf...
  • 1 篇 military technic...
  • 1 篇 guangdong power ...

作者

  • 1 篇 yaosong lu
  • 1 篇 su shenghui
  • 1 篇 wuqiang shen
  • 1 篇 donghe ni
  • 1 篇 wu guohua
  • 1 篇 gaborit philippe
  • 1 篇 liu tianhao
  • 1 篇 ye df
  • 1 篇 ruigang liang
  • 1 篇 chang xiaolin
  • 1 篇 ho pin-han
  • 1 篇 xiaoquan chen an...
  • 1 篇 ruatta olivier
  • 1 篇 li lun
  • 1 篇 chen chen
  • 1 篇 liu ming
  • 1 篇 xiang li
  • 1 篇 he guangqiang
  • 1 篇 guo ying
  • 1 篇 eweda e

语言

  • 17 篇 英文
  • 1 篇 其他
检索条件"主题词=signature algorithm"
18 条 记 录,以下是1-10 订阅
排序:
Performance Evaluation for the signature algorithm of ISDSR on Raspberry Pi  5
Performance Evaluation for the Signature Algorithm of ISDSR ...
收藏 引用
5th International Symposium on Computing and Networking (CANDAR)
作者: Kojima, Hideharu Yanai, Naoto Osaka Univ Grad Sch Informat Sci & Technol 1-5 Yamadaoka Suita Osaka Japan
Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN consists of one sink node and sensor nodes. Each se... 详细信息
来源: 评论
RankSign: An Efficient signature algorithm Based on the Rank Metric
RankSign: An Efficient Signature Algorithm Based on the Rank...
收藏 引用
6th International Workshop on Post-Quantum Cryptography (PQCrypto)
作者: Gaborit, Philippe Ruatta, Olivier Schrek, Julien Zemor, Gilles Univ Limoges XLIM DMI 123 Av Albert Thomas F-87060 Limoges France Univ Bordeaux Inst Math emat UMR 5251 Bordeaux France
In this paper we propose a new approach to code-based signatures that makes use in particular of rank metric codes. When the classical approach consists in finding the unique preimage of a syndrome through a decoding ... 详细信息
来源: 评论
AnonymousFox: An Efficient and Scalable Blockchain Consensus algorithm
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2022年 第23期9卷 24236-24252页
作者: Wan, Ji Hu, Kai Li, Jie Su, Hao Beihang Univ State Key Lab Software Dev Environm Beijing 100190 Peoples R China
Blockchain is an innovative application of distributed storage, consensus algorithm, encryption algorithm, and other computer technologies. The consensus algorithm is the key to keep consistent among blockchain nodes.... 详细信息
来源: 评论
Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach
收藏 引用
INFORMATION SCIENCES 2020年 509卷 290-303页
作者: Li, Lun Liu, Jiqiang Chang, Xiaolin Liu, Tianhao Liu, Jingxian Beijing Jiaotong Univ Beijing Key Lab Secur & Privacy Intelligent Trans 3 Shangyuancun Beijing 100044 Peoples R China Beijing Jiaotong Univ Sch Comp & Informat Technol 3 Shangyuancun Beijing 100044 Peoples R China
Bitcoin is being explored for applications in various Internet of Things (IoT) scenarios as a peer-to-peer payment platform. However, security and anonymity problems exist with Bitcoin, which threaten vulnerable IoT f... 详细信息
来源: 评论
Construction and Application Evaluation of the Traffic Management Information Verification Service Platform
Construction and Application Evaluation of the Traffic Manag...
收藏 引用
Image Processing, Electronics and Computers (IPEC), Asia-Pacific Conference on
作者: Hailong Jiang Zhi Yang Xiwei Quan Xiaoliang He Liu Ming Xiang Li Traffic Management Research Institute of the Ministry of Public Security Wuxi China
At present, many applications involving in traffic management information system query vehicles, violations, driving licenses from multiple data sources. There are many redundant codes in the query function and they a... 详细信息
来源: 评论
Research on Application Layer Security Communication Protocol Based on Lightweight NTRU Public Key Cryptography
Research on Application Layer Security Communication Protoco...
收藏 引用
International Conference on Intelligent Computing, Automation and Systems (ICICAS)
作者: Wenbin Liu Jiesheng Zheng Wuqiang Shen Yaosong Lu Ruigang Liang Jing Li Yiqi Hu Donghe Ni Guangdong Power Grid Co. Ltd. Guangzhou China Institute of Information Engineering Chinese Academy of Sciences Beijing China Beijing Institute of Electronic Technology Application Beijing China
The development of mobile Internet technology has made intelligent terminal devices and mobile applications popular, and computing at mobile devices is becoming more and more popular in people's daily lives. Howev... 详细信息
来源: 评论
Key-Insulated Undetachable Digital signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce
收藏 引用
MOBILE INFORMATION SYSTEMS 2016年 第Pt.3期2016卷 1-18页
作者: Shi, Yang Lin, Jie Xiong, Guoyue Wang, Xiaoping Fan, Hongfei Tongji Univ Sch Software Engn 4800 Caoan Highway Shanghai 201804 Peoples R China Tongji Univ Sch Econ & Management 4800 Caoan Highway Shanghai 201804 Peoples R China Tongji Univ Dept Comp Sci & Technol 4800 Caoan Highway Shanghai 201804 Peoples R China
Considering the security of both the customers' hosts and the eShops' servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital s... 详细信息
来源: 评论
Using density peaks sentence clustering for update summary generation
Using density peaks sentence clustering for update summary g...
收藏 引用
2016 IEEE Canadian Conference on Electrical and Computer Engineering, CCECE 2016
作者: Wu, Guohua Guo, Yutian Key Laboratory of Complex Systems Modeling and Simulation Ministry of Education School of Computer Science and Technology Hangzhou Dianzi University China
Update summarization can be a daunting task in automatic text summarization. It aims to distill evolved messages from a collection of new articles, under the assumption that the reader has already browsed the previous... 详细信息
来源: 评论
Leakage Prevention Method for Unstructured Data Based on Classification  6th
Leakage Prevention Method for Unstructured Data Based on Cla...
收藏 引用
6th International Conference on Applications and Techniques in Information Security (ATIS)
作者: Li, Hao Peng, Zewu Feng, Xinyao Ma, Hongxia Guangdong Power Grid Corp Informat Ctr Guangzhou Guangdong Peoples R China Chinese Acad Sci Inst Informat Engn SKLOIS Beijing Peoples R China
There is often a lot of sensitive information in the unstructured data of enterprise information network, if not controlled, the sensitive data will flow from the Intranet to the Extranet, which can easily lead to dis... 详细信息
来源: 评论
Quantum algorithm for Polynomial Root Finding Problem  10
Quantum Algorithm for Polynomial Root Finding Problem
收藏 引用
10th International Conference on Computational Intelligence and Security CIS 2014
作者: Sun, Guodong Su, Shenghui Xu, Maozhi Beijing Univ Technol Coll Comp Sci Beijing Peoples R China Peking Univ Sch Math Sci Beijing Peoples R China
Quantum computation is a new computing model based on fundamental quantum mechanical principle. Grover's algorithm finds the solution for a searching problem in the square root time of exhaustive search. Brassard,... 详细信息
来源: 评论