咨询与建议

限定检索结果

文献类型

  • 19 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 29 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 16 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 7 篇 信息与通信工程
    • 3 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 建筑学
  • 9 篇 理学
    • 6 篇 数学
    • 3 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 3 篇 forgery
  • 3 篇 security
  • 3 篇 protocols
  • 3 篇 equations
  • 2 篇 public key crypt...
  • 2 篇 manuals
  • 2 篇 educational inst...
  • 2 篇 authentication
  • 2 篇 process control
  • 2 篇 contracts
  • 1 篇 image fusion
  • 1 篇 trusted third pa...
  • 1 篇 ban logic
  • 1 篇 object detection
  • 1 篇 zinc
  • 1 篇 abuse-freeness
  • 1 篇 payment protocol
  • 1 篇 quantum entangle...
  • 1 篇 nominative signa...
  • 1 篇 network protocol...

机构

  • 4 篇 ministry of edu....
  • 2 篇 college of compu...
  • 2 篇 shaanxi telecom ...
  • 2 篇 key lab. of comp...
  • 2 篇 xi'an branch sha...
  • 2 篇 xi'an branch of ...
  • 2 篇 ministry of edu....
  • 2 篇 national compute...
  • 2 篇 xi'an branch of ...
  • 2 篇 key lab. of comp...
  • 2 篇 jiangsu high tec...
  • 2 篇 ministry of edu....
  • 1 篇 school of scienc...
  • 1 篇 school of electr...
  • 1 篇 ministry of educ...
  • 1 篇 ias bu huawei te...
  • 1 篇 key lab. of broa...
  • 1 篇 department of el...
  • 1 篇 school of commun...
  • 1 篇 ministry of educ...

作者

  • 6 篇 li hui
  • 4 篇 fan kai
  • 4 篇 kai fan
  • 4 篇 hui li
  • 4 篇 wang yue
  • 4 篇 yue wang
  • 2 篇 ma wenping
  • 2 篇 pei qingqi
  • 2 篇 zhang xue-jun
  • 1 篇 zhang yuqing
  • 1 篇 li maosen
  • 1 篇 zhang lei
  • 1 篇 ma jianfeng
  • 1 篇 wang dong-yong
  • 1 篇 lu hongwei
  • 1 篇 huixian li
  • 1 篇 zhao yizhu
  • 1 篇 zhou li-hua
  • 1 篇 zhuo zepeng
  • 1 篇 zhang hua

语言

  • 24 篇 英文
  • 4 篇 中文
  • 1 篇 其他
检索条件"机构=Ministry of Edu. Key Lab. of Computer Network and Information Security"
29 条 记 录,以下是1-10 订阅
排序:
Abuse-freeness electronic payment protocol
Abuse-freeness electronic payment protocol
收藏 引用
3rd IEEE International Conference on Intelligent networking and Collab.rativeSystems, INCoS 2011
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an China Xi'an Branch Shaanxi Telecom Ltd. Xi'an China
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ... 详细信息
来源: 评论
Forward secure proxy blind signature scheme
Forward secure proxy blind signature scheme
收藏 引用
3rd IEEE International Conference on Intelligent networking and Collab.rativeSystems, INCoS 2011
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an China Xi'an Branch Shaanxi Telecom Ltd. Xi'an China
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop... 详细信息
来源: 评论
A new abuse-free fair electronic payment protocol
A new abuse-free fair electronic payment protocol
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furt... 详细信息
来源: 评论
security analysis of the kerberos protocol using BAN logic
Security analysis of the kerberos protocol using BAN logic
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Fan, Kai Li, Hui Wang, Yue Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us... 详细信息
来源: 评论
A link analysis for passive UHF RFID system in LOS indoor environment
A link analysis for passive UHF RFID system in LOS indoor en...
收藏 引用
2008 International Conference on Wireless Communications, networking and Mobile Computing, WiCOM 2008
作者: Hong, Gang Wang Chang, Xing Petitioner Chang, Hua Zhu Ministry of Education Key Lab. Computer Network and Information Security Xidian University Xi'an China
A link analysis model for passive UHF RFID system in LOS indoor environment is developed and demonstrated. Using this model, the power received by tag and the read performance are investigated. The multipath fading an... 详细信息
来源: 评论
Full rate and full diversity STBC in decode-and-forward relay systems
Full rate and full diversity STBC in decode-and-forward rela...
收藏 引用
2010 International Conference on Communications and Intelligence information security, ICCIIS 2010
作者: Wang, Yong Li, Hui Ministry of Education Key Lab. of Computer Network and Information Security School of Telecommunications Engineering Xidian University Xi'an China
Diversity techniques are very effective tools to increase signal reception quality in Rayleigh fading channels. A novel space-time block coding method for cooperative relay networks is proposed which guarantees full d... 详细信息
来源: 评论
Improvements of the definition of image fidelity
Improvements of the definition of image fidelity
收藏 引用
MMM2006: 12th International Multi-Media Modelling Conference
作者: Yin, Zhong Hai Wang, Kun Jian, Jianfeng Zhou, Lihua Ministry of Edu. Key Lab. of Computer Network and Infor. Security Xidian Univ. Xi'an 710071 China School of Science Air Force Engineering Univercity Xi'an 710077 China
The defect of existing fidelity definition is discussed, by using this definition, it is found that two obviously different image can be determined to be approximate or the same. According to the defect, an improved f... 详细信息
来源: 评论
Improving efficiency of security schemes in automated trust negotiation
Improving efficiency of security schemes in automated trust ...
收藏 引用
2nd International Workshop on edu.ation Technology and computer Science, ETCS 2010
作者: Liu, Bailing Lu, Hongwei Zhao, Yizhu Ge, Feng College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Lab. of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When... 详细信息
来源: 评论
Improvement on WLAN multicast key management protocol
Improvement on WLAN multicast key management protocol
收藏 引用
2008 International Conference on Computational Intelligence and security, CIS 2008
作者: Huixian, Li Liaojun, Pang Dept. of Comput. Sci. and Engineering Northwestern Polytechnical Univ. Xi'an 710072 China Ministry of Edu. Key Lab. of Computer Networks and Information Security Xidian University Xi'an 710071 China
Multicasting is an important business in the field of the Wireless Local Area network (WLAN). The access point (AP) usually has to seed the same message to each station (STA) of a specific group, and the multicasting ... 详细信息
来源: 评论
A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce
收藏 引用
Journal of China University of Mining and Technology 2006年 第4期16卷 470-474页
作者: XIN Xiang-jun WANG Mei-zhi XIAO Guo-zhen The Ministry of Edu. Key Lab. of Computer Network and Infor. Security Xidian University Xi' an Shanxi 710071 China Department of lnformation and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China Department of Math. & Physics Zhumadian Institute of Education Zhumadian Henan 463000 China
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ... 详细信息
来源: 评论