skip to main content
Resultados 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing
Material Type:
Artigo
Adicionar ao Meu Espaço

Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing

ZHAO, Jining ; XU, Chunxiang ; LI, Fagen ; ZHANG, Wenzheng

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013/12/01, Vol.E96.A(12), pp.2709-2716 [Periódico revisado por pares]

Tokyo: The Institute of Electronics, Information and Communication Engineers

Texto completo disponível

2
Quantum Steganography with High Efficiency with Noisy Depolarizing Channels
Material Type:
Artigo
Adicionar ao Meu Espaço

Quantum Steganography with High Efficiency with Noisy Depolarizing Channels

LIAO, Xin ; WEN, Qiaoyan ; SONG, Tingting ; ZHANG, Jie

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013/10/01, Vol.E96.A(10), pp.2039-2044 [Periódico revisado por pares]

Tokyo: The Institute of Electronics, Information and Communication Engineers

Texto completo disponível

3
On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
Material Type:
Artigo
Adicionar ao Meu Espaço

On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model

SUN, Ying ; YU, Yong ; ZHANG, Xiaosong ; CHAI, Jiwen

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013/03/01, Vol.E96.A(3), pp.721-723 [Periódico revisado por pares]

Tokyo: The Institute of Electronics, Information and Communication Engineers

Texto completo disponível

4
Exact Power Analysis of Unified Code over Generalized Mersenne Prime Fields
Material Type:
Artigo
Adicionar ao Meu Espaço

Exact Power Analysis of Unified Code over Generalized Mersenne Prime Fields

MASUE, Toshiyuki

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013/02/01, Vol.E96.A(2), pp.618-625 [Periódico revisado por pares]

Tokyo: The Institute of Electronics, Information and Communication Engineers

Texto completo disponível

5
Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme : Cryptography and Information Security
Material Type:
Artigo
Adicionar ao Meu Espaço

Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme : Cryptography and Information Security

BENNIAN DOU ; HONG ZHANG ; CHEN, Chun-Hua ; CHUNGEN XU

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (1), p.242-243 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

6
Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes : Discrete Mathematics and Its Applications
Material Type:
Artigo
Adicionar ao Meu Espaço

Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes : Discrete Mathematics and Its Applications

DOU, Bennian

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (6), p.1171-1172 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

7
One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary : Discrete Mathematics and Its Applications
Material Type:
Artigo
Adicionar ao Meu Espaço

One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary : Discrete Mathematics and Its Applications

YONEYAMA, Kazuki

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (6), p.1124-1138 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

8
Multilane Hashing Mode Suitable for Parallel Processing : Information Theory and Its Application
Material Type:
Artigo
Adicionar ao Meu Espaço

Multilane Hashing Mode Suitable for Parallel Processing : Information Theory and Its Application

KUWAKADO, Hidenori ; HIROSE, Shoichi

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (12), p.2434-2442 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

9
A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound : Cryptography and Information Security
Material Type:
Artigo
Adicionar ao Meu Espaço

A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound : Cryptography and Information Security

YASUDA, Kan

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (1), p.237-241 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

10
Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs : Discrete Mathematics and Its Applications
Material Type:
Artigo
Adicionar ao Meu Espaço

Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs : Discrete Mathematics and Its Applications

NGUYEN, Manh Ha ; YASUNAGA, Kenji ; TANAKA, Keisuke

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (6), p.1100-1111 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

Resultados 1 2 3 4 5 next page

Buscando em bases de dados remotas. Favor aguardar.