限定检索结果

检索条件"机构=School of Information Security Engineering"
5 条 记 录,以下是1-10 订阅
视图:
排序:
Identity-based Verifiably Committed Signature Scheme without Random Oracles
收藏 引用
《Journal of Shanghai Jiaotong university(Science)》2008年 第1期13卷 110-115页
作者:孙迅 李建华 陈恭亮Department of Electronic Engineering Shanghai Jiaotong University School of Information Security Engineering Shanghai Jiaotong University Shanghai 200240 China School of Information Security Engineering Shanghai Jiaotong University 
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, b...
来源:详细信息评论
Parallel Key-insulated Signature: Framework and Construction
收藏 引用
《Journal of Shanghai Jiaotong university(Science)》2008年 第1期13卷 6-11页
作者:翁健 陈克非 李祥学 刘胜利 邱卫东Department of Computer Science and Engineering Shanghai Jiaotong University School of Information Security Engineering Shanghai Jiaotong University 
To deal with the key-exposure problem in signature systems, a new framework named parallel key-insulated signature (PKIS) was introduced, and a concrete PKIS scheme was proposed. Compared with traditional key-insulate...
来源:详细信息评论
Design and Implementation of Weibo Sentiment Analysis Based on LDA and Dependency Parsing
收藏 引用
《China Communications》2016年 第11期13卷 91-105页
作者:Yonggan Li Xueguang Zhou Yan Sun Huanguo ZhangComputer School of Wuhan UniversityWuhan University The Key Laboratory of Aerospace Information Security and Trust ComputingMinistry of Education Department of Information SecurityNavy University of Engineering Unit Number of 92941PLA 
information content security is a branch of cyberspace security. How to effectively manage and use Weibo comment information has become a research focus in the field of information content security. Three main tasks i...
来源:详细信息评论
Similarity measure design for high dimensional data
收藏 引用
《Journal of Central South University》2014年 第9期21卷 3534-3540页
作者:LEE Sang-hyuk YAN Sun JEONG Yoon-su SHIN Seung-sooDepartment of Electrical and Electronic EngineeringXi'an Jiaotong-Liverpool University International Business School Suzhou Xi'an Jiaotong-Liverpool University Department of Information Communication Engineering Mokwon University Department of Information Security Tongmyong University 
information analysis of high dimensional data was carried out through similarity measure application. High dimensional data were considered as the a typical structure. Additionally, overlapped and non-overlapped data ...
来源:详细信息评论
Formal analysis and design of multi-party fair exchange protocols
收藏 引用
《Science in China(Series F)》2006年 第2期49卷 155-174页
作者:QING Sihan1,2,3 & LI Gaicheng1,3 1. engineering Research Center for information security Technology, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 2. Beijing Zhongke Ansheng Corporation of information Technology, Beijing 100080, China 3. Graduate school of the Chinese Academy of Sciences, Beijing 100039, ChinaEngineering Research Center for Information Security Technology Institute of Software Chinese Academy of Sciences Beijing China Beijing Zhongke Ansheng Corporation of Information Technology Beijing China Graduate School of the Chinese Academy of Sciences Beijing China 
Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange...
来源:详细信息评论
聚类工具 回到顶部