中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
数学与系统科学研究院 [2]
软件研究所 [2]
国家天文台 [1]
自动化研究所 [1]
重庆绿色智能技术研究... [1]
采集方式
OAI收割 [7]
内容类型
期刊论文 [5]
会议论文 [2]
发表日期
2023 [1]
2020 [2]
2016 [1]
2015 [1]
2010 [1]
2004 [1]
更多
学科主题
筛选
浏览/检索结果:
共7条,第1-7条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Encrypted Finite-Horizon Energy-to-Peak State Estimation for Time-Varying Systems Under Eavesdropping Attacks: Tackling Secrecy Capacity
期刊论文
OAI收割
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 4, 页码: 985-996
作者:
Lei Zou
;
Zidong Wang
;
Bo Shen
;
Hongli Dong
;
Guoping Lu
  |  
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2023/03/22
Artificial-noise-assisted technique
eavesdropping
encryption-decryption scheme
energy-to-peak state estimation
finite-horizon state estimation
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
期刊论文
OAI收割
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
  |  
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2020/10/12
decoding
public key cryptography
quantum cryptography
computational complexity
optimisation
cyclic codes
IND-CPA security
NIST PQC project
hamming quasicyclic cryptosystem
code-based key encapsulation mechanism
NIST standardisation process
public-key encryption scheme
IND-CCA2 secure KEM
revised scheme HQC- beta
HQC cryptosystem
s-DQCSD problem
s-decision quasi-cyclic syndrome decoding
plaintext attack
seIMC: A GSW-Based Secure and Efficient Integer Matrix Computation Scheme With Implementation
期刊论文
OAI收割
IEEE ACCESS, 2020, 卷号: 8, 页码: 98383-98394
作者:
Bai, Yanan
;
Shi, Xiaoyu
;
Wu, Wenyuan
;
Chen, Jingwei
;
Feng, Yong
  |  
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2020/08/24
Encryption
Data privacy
Cloud computing
Lattices
Machine learning
Computational efficiency
Homomorphic encryption
matrix computation
machine learning
GSW encryption scheme
big data
privacy protection
An Encryption Scheme Based on Synchronization of Two-Layered Complex Dynamical Networks
期刊论文
OAI收割
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2016, 卷号: 63, 期号: 11, 页码: 2010-2021
作者:
Liu, Hui
;
Wan, Haibo
;
Tse, Chi K.
;
Lu, Jinhu
  |  
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2018/07/30
Chaotic systems
complex dynamical networks
encryption scheme
node-to-node synchronization
two-layered networks
Image compression and encryption scheme using fractal dictionary and Julia set
期刊论文
OAI收割
IET IMAGE PROCESSING, 2015, 卷号: 9, 期号: 3, 页码: 173-183
作者:
Sun, Yuanyuan
;
Xu, Rudan
;
Chen, Lina
;
Hu, Xiaopeng
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2016/11/11
data compression
image coding
cryptography
fractals
image reconstruction
image compression
image encryption scheme
fractal dictionary
Julia set
data transmission security
data storage security
multimedia data
compression-encryption scheme
image reconstruction
tiny perturbation
stream cipher encryption
diffusion process
plaintext attack
time consumption reduction
a scalable encryption scheme for ccsds image data compression standard
会议论文
OAI收割
2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, Beijing, 40878
Mingyu Li
;
Xiaowei Yi
;
Hengtai Ma
  |  
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2011/03/31
CCSDS image data compression standard
ciphertext bitstream
end-to-end security
low-complexity transparent transcoding
near rate-distortion
packet header
scalable encryption scheme
truncation points
cryptography
data compression
image coding
transcoding
a new cembs based on rsa signatures and its application in constructing fair exchange protocol
会议论文
OAI收割
IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE 2004), Taipei, TAIWAN, MAR 28-31,
Zhou YB
;
Zhang ZF
;
Qing SH
;
Liu J
  |  
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2011/07/29
RSA signatures
cryptographic primitive
digital signature
e-commerce protocols
encryption scheme
fair exchange protocol
security analysis
cryptography
electronic commerce
message authentication