搜索筛选:
搜索耗时0.1241秒,为你在为你在102,285,761篇论文里面共找到 13 篇相符的论文内容
发布年度:
[期刊论文] 作者:Zhong Wang,Yiliang Han,
来源:国际计算机前沿大会会议论文集 年份:2019
Coding cryptography can resist quantum computing attacks with high efficiency. It is similar to multivariate public key cryptography when constructing core mapp...
[期刊论文] 作者:Xi Lin,Yiliang Han,
来源:国际计算机前沿大会会议论文集 年份:2017
To solve the problems of data sharing in social network,such as management of private data is too loose,access permissions are not clear,mode of data sharing is...
[期刊论文] 作者:Shuaishuai Zhu,Yiliang Han,
来源:中国通信:英文版 年份:2021
Trapdoor is a key component of public key cryptography design which is the essential security foundation of modern cryptography.Normally,the traditional way in designing a trapdoor is to identify a computationally hard problem,such as the N......
[期刊论文] 作者:Deyang Zhang,Yiliang Han,Xiaol,
来源:国际计算机前沿大会会议论文集 年份:2018
...
[期刊论文] 作者:Xiaolong Li,Yiliang Han,Deyang,
来源:国际计算机前沿大会会议论文集 年份:2018
...
[期刊论文] 作者:Mingye Liu,Yiliang Han,Xiaoyua,
来源:国际计算机前沿大会会议论文集 年份:2015
McEliece cryptosystem is a public key cryptosystem that combines channel coding and encryption,and the oldest PKC that is conjectured to be postquantum secure.T...
[期刊论文] 作者:Yiliang Han,Yincheng Bai,Dingy,
来源:国际计算机前沿大会会议论文集 年份:2015
An attribute-based generalized signcryption scheme based on bilinear pairing has been proposed. By changing attributes, encryption-only mode, signature-only mod...
[期刊论文] 作者:Yiliang Han,Shuaishuai Zhu,Yu,
来源:中国通信:英文版 年份:2021
Unauthorized access to location information in location-based service is one of the most critical security threats to mobile Internet.In order to solve the prob...
[期刊论文] 作者:Fei Chen,Yiliang Han,Di Jiang,,
来源:国际计算机前沿大会会议论文集 年份:2016
In the driven of big data, social computing and information security is undergoing rapid development and beginning to cross. This paper describes a key-policy a...
[期刊论文] 作者:Zhen Liu,Xiaoyuan Yang,Weidong Zhong,Yiliang Han,,
来源:Tsinghua Science and Technology 年份:2014
Chosen Ciphertext Attack(CCA)security on the standard model is widely accepted as the standard security notion for the public key cryptosystem.The existing CCA-...
[期刊论文] 作者:Yiliang Han,Shuaishuai Zhu,Yu Li,Xi Lin,
来源:中国通信(英文版) 年份:2021
Unauthorized access to location informa-tion in location-based service is one of the most crit-ical security threats to mobile Internet. In order to solve the p...
[期刊论文] 作者:Liqiang WU,Yiliang HAN,Xiaoyuan YANG,Minqing ZHANG,
来源:信息与电子工程前沿(英文版) 年份:2022
Threshold proxy re-encryption (TPRE) can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies, and can also provide normal services even when c......
[会议论文] 作者:Yiliang Han,韩一梁,Jungang Miao,苗俊刚,Yongfang Zhang,张勇芳,
来源:中国电子学会第十八届青年学术年会 年份:2012
为了满足某八木阵列天线赋形波束的要求,根据天线系统关于馈电网络部分的指标设计了工作在220MHz-240MHz频段、相对带宽为9%的1-3功分馈电网络.功分馈电网络由功分网络、衰减器和巴伦构成.为了解决从输入端口到天线阵列的阻抗匹配问题,首先采用巴伦方案解决了有......
相关搜索: