skip to main content
Resultados 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing
Material Type:
Artigo
Adicionar ao Meu Espaço

Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing

ZHAO, Jining ; XU, Chunxiang ; LI, Fagen ; ZHANG, Wenzheng

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013/12/01, Vol.E96.A(12), pp.2709-2716 [Periódico revisado por pares]

Tokyo: The Institute of Electronics, Information and Communication Engineers

Texto completo disponível

2
Quantum Steganography with High Efficiency with Noisy Depolarizing Channels
Material Type:
Artigo
Adicionar ao Meu Espaço

Quantum Steganography with High Efficiency with Noisy Depolarizing Channels

LIAO, Xin ; WEN, Qiaoyan ; SONG, Tingting ; ZHANG, Jie

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013/10/01, Vol.E96.A(10), pp.2039-2044 [Periódico revisado por pares]

Tokyo: The Institute of Electronics, Information and Communication Engineers

Texto completo disponível

3
On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
Material Type:
Artigo
Adicionar ao Meu Espaço

On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model

SUN, Ying ; YU, Yong ; ZHANG, Xiaosong ; CHAI, Jiwen

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013/03/01, Vol.E96.A(3), pp.721-723 [Periódico revisado por pares]

Tokyo: The Institute of Electronics, Information and Communication Engineers

Texto completo disponível

4
Exact Power Analysis of Unified Code over Generalized Mersenne Prime Fields
Material Type:
Artigo
Adicionar ao Meu Espaço

Exact Power Analysis of Unified Code over Generalized Mersenne Prime Fields

MASUE, Toshiyuki

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013/02/01, Vol.E96.A(2), pp.618-625 [Periódico revisado por pares]

Tokyo: The Institute of Electronics, Information and Communication Engineers

Texto completo disponível

5
Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme : Cryptography and Information Security
Material Type:
Artigo
Adicionar ao Meu Espaço

Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme : Cryptography and Information Security

BENNIAN DOU ; HONG ZHANG ; CHEN, Chun-Hua ; CHUNGEN XU

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (1), p.242-243 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

6
id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing : Discrete Mathematics and Its Applications
Material Type:
Artigo
Adicionar ao Meu Espaço

id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing : Discrete Mathematics and Its Applications

FUJIOKA, Atsushi ; HOSHINO, Fumitaka ; KOBAYASHI, Tetsutaro ; SUZUKI, Koutarou ; USTAOGLU, Berkant ; YONEYAMA, Kazuki

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (6), p.1139-1155 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

7
Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes : Discrete Mathematics and Its Applications
Material Type:
Artigo
Adicionar ao Meu Espaço

Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes : Discrete Mathematics and Its Applications

DOU, Bennian

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (6), p.1171-1172 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

8
Key Substitution Attacks on Multisignature Schemes : Cryptography and Information Security
Material Type:
Artigo
Adicionar ao Meu Espaço

Key Substitution Attacks on Multisignature Schemes : Cryptography and Information Security

BENNIAN DOU ; HONG ZHANG ; CHEN, Chun-Hua ; CHUNGEN XU

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (1), p.244-245 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

9
On the Security of the Verifiably Encrypted Signature Scheme of Boneh, Gentry, Lynn and Shacham Revisited : Discrete Mathematics and Its Applications
Material Type:
Artigo
Adicionar ao Meu Espaço

On the Security of the Verifiably Encrypted Signature Scheme of Boneh, Gentry, Lynn and Shacham Revisited : Discrete Mathematics and Its Applications

DOU, Bennian

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (6), p.1169-1170 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

10
A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound : Cryptography and Information Security
Material Type:
Artigo
Adicionar ao Meu Espaço

A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound : Cryptography and Information Security

YASUDA, Kan

IEICE transactions on fundamentals of electronics, communications and computer sciences, 2013, Vol.96 (1), p.237-241 [Periódico revisado por pares]

Tokyo: Engineering Sciences Society

Texto completo disponível

Resultados 1 2 3 4 5 next page

Buscando em bases de dados remotas. Favor aguardar.