搜索筛选:
搜索耗时0.4790秒,为你在为你在102,267,441篇论文里面共找到 1,000 篇相符的论文内容
类      型:
[期刊论文] 作者:, 来源:Science China(Physics,Mechanics & Astronomy) 年份:2010
A new protocol for the anonymous communication of quantum information is proposed....
[期刊论文] 作者:ZHANG De-dong,MA Zhao-feng,NIU Xin-xin,LI Guo-you,, 来源:The Journal of China Universities of Posts and Telecommunica 年份:2013
Anonymous proxy signature scheme can provide the privacy protection for the proxy signer.Recently, Yu...et al.proposed an anonymous proxy signature, which can be...
[会议论文] 作者:RuiJIANG;YuanXING;, 来源:第十届全国信息隐藏暨多媒体信息安全学术大会CIHW2012 年份:2012
Providing anonymous communications in mobile ad hoc networks is an effective countermeasure against malicious...Various anonymous routing scheme...
[会议论文] 作者:Zhang Xinfang,Xu Qiuliang, 来源:中国通信学会第五届学术年会 年份:2008
Analysing some typical identity-based.Encryption schemes,we get that most of them are not anonymous.In...
[期刊论文] 作者:YIN Fengmei,PU Guangning,, 来源:Wuhan University Journal of Natural Sciences 年份:2016
A novel anonymous authentication scheme is proposed based on the ring signature....
[期刊论文] 作者:, 来源:微电脑世界 年份:2012
【著名黑客组织Anonymous宣称对全球25家大型石油企业发动代号为“OpFuelStrike”的网络攻击】  由于Anonymous是一个攻击水平很高的黑客组织,所以这次代号为“OpFuelStrike...在2011年,索尼PSN网络遭遇Anonymous攻击,网络在攻击后的几个月才完全恢复正常,因此造成的经济损失难以估量。除此之外,Anonymous还先...
[期刊论文] 作者:YIN Fengmei,HOU Zhengfeng,WU Hao, 来源:武汉大学自然科学学报(英文版) 年份:2020
Based on elliptic curve public key cryptosystem and with the help of ring signature,a traceable and anonymous...
[期刊论文] 作者:徐静,朱文涛,, 来源:Journal of Computer Science & Technology 年份:2013
Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because...
[期刊论文] 作者:Xuexian HU,Jiang ZHANG,Zhenfeng ZHANG,Jing XU,, 来源:Science China(Information Sciences) 年份:2017
Anonymous password authenticated key exchange(APAKE) is an important cryptographic primitive, through...
[期刊论文] 作者:, 来源:中国科学:物理学、力学、天文学英文版 年份:2010
quantum protocols were proposed in a recent paper by Vaccaro,Spring and Chefles for ensuring the anonymous...
[期刊论文] 作者:Mu Zhou,Yiyao Liu,Yong Wang,Ze, 来源:数字通信与网络:英文版 年份:2019
of location privacy under big data and improve the user positioning experience,a new concept of anonymous...
[期刊论文] 作者:, 来源:Wuhan University Journal of Natural Sciences 年份:2005
using Pedersen’s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous...
[期刊论文] 作者:Mu Zhou,Yiyao Liu,Yong Wang,Zengshan Tian, 来源:数字通信与网络(英文) 年份:2019
of location privacy under big data and improve the user positioning experience,a new concept of anonymous...
[期刊论文] 作者:, 来源:The Journal of China Universities of Posts and Telecommunica 年份:2008
wireless networks, and service providers in roaming wireless environments, this article presents an anonymous...
[期刊论文] 作者:LIUYi XIANGMing-sen WANGYu-min, 来源:武汉大学学报:自然科学英文版 年份:2005
Pedersen' s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous...
[期刊论文] 作者:Sung-Ming Yen,Tsung-Min Kuo,Tz, 来源:通讯、网络与系统学国际期刊(英文) 年份:2018
Anonymous authentication schemes, mostly based on the notion of group signatures, allow a group member...
[期刊论文] 作者:WANG Wei-ping,WANG Jian-xin, 来源:中南工业大学学报 年份:2004
A new architecture for scalable anonymous communication system(SACS) was proposed....
[期刊论文] 作者:Zhou Rui-Rui,Yang Li, 来源:中国物理B(英文版) 年份:2012
An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate...
[期刊论文] 作者:ZHANG De-dong,MA Zhao-feng,NIU Xin-xin,Peng Yong,, 来源:The Journal of China Universities of Posts and Telecommunica 年份:2013
order to solve the contradictions between user privacy protection and identity authentication, an anonymous...
[期刊论文] 作者:Liang Jian Ao Qingyun Chen Yin, 来源:电子科学学刊:英文版 年份:2001
This letter presents an anonymous off-line electronic payment model with multiple issuing-banks and gives...
相关搜索: