咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 6 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 1 篇 光学工程
    • 1 篇 信息与通信工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 物理学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 1 篇 trusted third pa...
  • 1 篇 abuse-freeness
  • 1 篇 nominative signa...
  • 1 篇 manuals
  • 1 篇 authentication
  • 1 篇 process control
  • 1 篇 digital signatur...
  • 1 篇 concurrent signa...
  • 1 篇 contracts
  • 1 篇 forgery
  • 1 篇 medium access co...
  • 1 篇 security
  • 1 篇 protocols
  • 1 篇 electronic payme...
  • 1 篇 image analysis
  • 1 篇 abuse-freeness e...
  • 1 篇 trusted third pa...
  • 1 篇 formal methods
  • 1 篇 equations
  • 1 篇 parks

机构

  • 4 篇 ministry of edu....
  • 2 篇 xi'an branch sha...
  • 2 篇 xi'an branch of ...
  • 1 篇 school of scienc...
  • 1 篇 school of electr...
  • 1 篇 ministry of edu....
  • 1 篇 ministry of edu....
  • 1 篇 department of ma...
  • 1 篇 national key lab...
  • 1 篇 the ministry of ...
  • 1 篇 department of ln...

作者

  • 4 篇 fan kai
  • 4 篇 wang yue
  • 4 篇 li hui
  • 1 篇 chen chen
  • 1 篇 xiao guo-zhen
  • 1 篇 wang mei-zhi
  • 1 篇 pei qingqi
  • 1 篇 jian jianfeng
  • 1 篇 xin xiang-jun
  • 1 篇 wang kun
  • 1 篇 yin zhong hai
  • 1 篇 gao xinbo
  • 1 篇 zhou lihua

语言

  • 7 篇 英文
检索条件"机构=The Ministry of Edu. Key Lab. of Computer Network and Infor. Security"
7 条 记 录,以下是1-10 订阅
排序:
Improvements of the definition of image fidelity
Improvements of the definition of image fidelity
收藏 引用
MMM2006: 12th International Multi-Media Modelling Conference
作者: Yin, Zhong Hai Wang, Kun Jian, Jianfeng Zhou, Lihua Ministry of Edu. Key Lab. of Computer Network and Infor. Security Xidian Univ. Xi'an 710071 China School of Science Air Force Engineering Univercity Xi'an 710077 China
The defect of existing fidelity definition is discussed, by using this definition, it is found that two obviously different image can be determined to be approximate or the same. According to the defect, an improved f... 详细信息
来源: 评论
A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce
收藏 引用
Journal of China University of Mining and Technology 2006年 第4期16卷 470-474页
作者: XIN Xiang-jun WANG Mei-zhi XIAO Guo-zhen The Ministry of Edu. Key Lab. of Computer Network and Infor. Security Xidian University Xi' an Shanxi 710071 China Department of lnformation and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China Department of Math. & Physics Zhumadian Institute of Education Zhumadian Henan 463000 China
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ... 详细信息
来源: 评论
Abuse-freeness electronic payment protocol
Abuse-freeness electronic payment protocol
收藏 引用
3rd IEEE International Conference on Intelligent networking and Collab.rativeSystems, INCoS 2011
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an China Xi'an Branch Shaanxi Telecom Ltd. Xi'an China
Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in ... 详细信息
来源: 评论
Forward secure proxy blind signature scheme
Forward secure proxy blind signature scheme
收藏 引用
3rd IEEE International Conference on Intelligent networking and Collab.rativeSystems, INCoS 2011
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an China Xi'an Branch Shaanxi Telecom Ltd. Xi'an China
There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper prop... 详细信息
来源: 评论
A new abuse-free fair electronic payment protocol
A new abuse-free fair electronic payment protocol
收藏 引用
5th International Conference on infor.ation Assurance and security, IAS 2009
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furt... 详细信息
来源: 评论
security analysis of the kerberos protocol using BAN logic
Security analysis of the kerberos protocol using BAN logic
收藏 引用
5th International Conference on infor.ation Assurance and security, IAS 2009
作者: Fan, Kai Li, Hui Wang, Yue Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us... 详细信息
来源: 评论
A delay guaranteed and services differentiated MAC protocol based on location and reservation in near-space
收藏 引用
Journal of Convergence infor.ation Technology 2011年 第2期6卷 120-130页
作者: Chen, Chen Gao, Xinbo Pei, Qingqi National Key Lab. of Integrated Service Networks Xidian Univ Xi'an 710071 China School of Electronic Engineering Xidian Univ Xi'an 710071 China Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian Univ Xi'an 710071 China
With an ever-increasing interests and demands in Near-Space, more and more researchers have put their attentions on this field, leading to an emerging needs for modeling the 20-100km altitude space especially for broa... 详细信息
来源: 评论