咨询与建议

限定检索结果

文献类型

  • 19 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 29 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 16 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 7 篇 信息与通信工程
    • 3 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 建筑学
  • 9 篇 理学
    • 6 篇 数学
    • 3 篇 物理学
    • 1 篇 统计学(可授理学、...
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 3 篇 forgery
  • 3 篇 security
  • 3 篇 protocols
  • 3 篇 equations
  • 2 篇 public key crypt...
  • 2 篇 manuals
  • 2 篇 educational inst...
  • 2 篇 authentication
  • 2 篇 process control
  • 2 篇 contracts
  • 1 篇 image fusion
  • 1 篇 trusted third pa...
  • 1 篇 ban logic
  • 1 篇 object detection
  • 1 篇 zinc
  • 1 篇 abuse-freeness
  • 1 篇 payment protocol
  • 1 篇 quantum entangle...
  • 1 篇 nominative signa...
  • 1 篇 network protocol...

机构

  • 4 篇 ministry of edu....
  • 2 篇 college of compu...
  • 2 篇 shaanxi telecom ...
  • 2 篇 key lab. of comp...
  • 2 篇 xi'an branch sha...
  • 2 篇 xi'an branch of ...
  • 2 篇 ministry of edu....
  • 2 篇 national compute...
  • 2 篇 xi'an branch of ...
  • 2 篇 key lab. of comp...
  • 2 篇 jiangsu high tec...
  • 2 篇 ministry of edu....
  • 1 篇 school of scienc...
  • 1 篇 school of electr...
  • 1 篇 ministry of educ...
  • 1 篇 ias bu huawei te...
  • 1 篇 key lab. of broa...
  • 1 篇 department of el...
  • 1 篇 school of commun...
  • 1 篇 ministry of educ...

作者

  • 6 篇 li hui
  • 4 篇 fan kai
  • 4 篇 kai fan
  • 4 篇 hui li
  • 4 篇 wang yue
  • 4 篇 yue wang
  • 2 篇 ma wenping
  • 2 篇 pei qingqi
  • 2 篇 zhang xue-jun
  • 1 篇 zhang yuqing
  • 1 篇 li maosen
  • 1 篇 zhang lei
  • 1 篇 ma jianfeng
  • 1 篇 wang dong-yong
  • 1 篇 lu hongwei
  • 1 篇 huixian li
  • 1 篇 zhao yizhu
  • 1 篇 zhou li-hua
  • 1 篇 zhuo zepeng
  • 1 篇 zhang hua

语言

  • 24 篇 英文
  • 4 篇 中文
  • 1 篇 其他
检索条件"机构=Ministry of Edu. Key Lab. of Computer Network and Information Security"
29 条 记 录,以下是11-20 订阅
排序:
Forward Secure Proxy Blind Signature Scheme
Forward Secure Proxy Blind Signature Scheme
收藏 引用
International Conference on Intelligent networking and Collab.rative Systems (INCOS)
作者: Kai Fan Yue Wang Hui Li Ministry of Edu. Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Shaanxi Telecom Limited Xi'an China
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop... 详细信息
来源: 评论
Abuse-freeness Electronic Payment Protocol
Abuse-freeness Electronic Payment Protocol
收藏 引用
International Conference on Intelligent networking and Collab.rative Systems (INCOS)
作者: Kai Fan Yue Wang Hui Li Ministry of Edu. Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Shaanxi Telecom Limited Xi'an China
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ... 详细信息
来源: 评论
Concurrent signature protocol on conic curve over ring Zn
Concurrent signature protocol on conic curve over ring Zn
收藏 引用
International Conference on Electronics, Communications and Control (ICECC)
作者: Li Zhanhu College of Mathematics and Information System Xian Yang Normal University Xianyang Shaanxi China Ministry of Edu. Key Laboratory of Computer Network and Information Security Xidian University Xian Shaanxi China
The proposing of concurrent signatures makes it the truly fairness to both participants. Compared with the finite field, conic curves have advantages of embedding plaintext 'conveniently, easy points operating, an... 详细信息
来源: 评论
Full rate and full diversity STBC in decode-and-forward relay systems
Full rate and full diversity STBC in decode-and-forward rela...
收藏 引用
2010 International Conference on Communications and Intelligence information security, ICCIIS 2010
作者: Wang, Yong Li, Hui Ministry of Education Key Lab. of Computer Network and Information Security School of Telecommunications Engineering Xidian University Xi'an China
Diversity techniques are very effective tools to increase signal reception quality in Rayleigh fading channels. A novel space-time block coding method for cooperative relay networks is proposed which guarantees full d... 详细信息
来源: 评论
Improving efficiency of security schemes in automated trust negotiation
Improving efficiency of security schemes in automated trust ...
收藏 引用
2nd International Workshop on edu.ation Technology and computer Science, ETCS 2010
作者: Liu, Bailing Lu, Hongwei Zhao, Yizhu Ge, Feng College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Lab. of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When... 详细信息
来源: 评论
New construction of single-and multi-output Boolean functions with high algebraic immunity
New construction of single-and multi-output Boolean function...
收藏 引用
作者: He, Yefeng Ma, Wenping Ministry of Education Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China School of Communication and Information Engineering Xi'an Institute of Post and Telecommunications Xi'an 710121 China
In order to respond to algebraic attacks, it is important to construct Boolean functions with high algebraic immunity of the graphs. In this paper, the complicated problem of algebraic immunity of the graph is convert... 详细信息
来源: 评论
A new abuse-free fair electronic payment protocol
A new abuse-free fair electronic payment protocol
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furt... 详细信息
来源: 评论
security analysis of the kerberos protocol using BAN logic
Security analysis of the kerberos protocol using BAN logic
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Fan, Kai Li, Hui Wang, Yue Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us... 详细信息
来源: 评论
Study of secret sharing schemes based on quantum theory
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 127-132+139页
作者: Zhu, Zhen-Chao Zhang, Yu-Qing Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China National Computer Network Intrusion Protection Center GUCAS Beijing 100043 China
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quant... 详细信息
来源: 评论
An active defense model and framework of insider threats detection and sense
An active defense model and framework of insider threats det...
收藏 引用
5th International Conference on information Assurance and security, IAS 2009
作者: Zhang, Hongbin Ma, Jianfeng Wang, Yinchuan Pei, Qingqi Ministry of Education Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China Inst. of Information Sci. and Eng. Hebei Univ. of Sci. and Tech. Shijiazhuang 050018 China Research Institute China Electronic Equipment and Systems Engineering Corporation Beijing 100141 China
Insider attacks is a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who take advantage of familiarity with the computational environment and abuse their pri... 详细信息
来源: 评论