中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [12]
计算技术研究所 [1]
采集方式
OAI收割 [13]
内容类型
期刊论文 [13]
发表日期
2020 [1]
2016 [2]
2014 [1]
2013 [3]
2012 [1]
2010 [4]
更多
学科主题
Computer S... [5]
Informatio... [3]
Engineerin... [1]
筛选
浏览/检索结果:
共13条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0
期刊论文
OAI收割
COMPUTER NETWORKS, 2020, 卷号: 179, 页码: 18
作者:
Zhang, Qianying
;
Zhao, Shijun
  |  
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2020/12/10
Security analysis
Authenticated key exchange
TPM 2.0
Authenticated key exchange with entities from different settings and varied groups
期刊论文
OAI收割
SECURITY AND COMMUNICATION NETWORKS, 2016, 卷号: 9, 期号: 12, 页码: 1843-1863
Guo, YF
;
Zhang, ZF
  |  
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2016/12/09
Authenticated Key Exchange
Security Model
Certificate-based protocols
Identity-based protocols
Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction
期刊论文
OAI收割
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 卷号: 29, 期号: 3, 页码: 567-578
Lu, SQ
;
Zhao, JH
;
Cheng, QF
  |  
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2016/12/13
KCI attack
SC attack
Scyther
authenticated key exchange protocol
Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
期刊论文
OAI收割
Nonlinear Dynamics, 2014, 卷号: 78, 期号: 2, 页码: 1293-1300
Hu, Xuexian (1)
;
Zhang, Zhenfeng (1)
  |  
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2014/12/16
Chaotic maps
Key exchange protocol
Anonymity
Man-in-the-middle attack
An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
期刊论文
OAI收割
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 卷号: 38, 期号: 8, 页码: 2055-2061
He, Debiao
;
Chen, Yitao
;
Chen, Jianhua
  |  
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2014/12/16
ID-based
Three-party key exchange
Elliptic curve cryptosystem
对一个强安全的认证密钥交换协议的分析
期刊论文
OAI收割
电子与信息学报, 2013, 期号: 9, 页码: 2278-2282
胡学先
;
魏江宏
;
叶茂
  |  
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2014/12/16
密码学
认证密钥交换
可证明安全
假冒攻击
Cryptography
Authenticated Key Exchange (AKE)
Provable security
Imitate attack
Analysis and enhancement of an optimized gateway-oriented password-based authenticated key exchange protocol
期刊论文
OAI收割
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013, 卷号: E96-A, 期号: 9, 页码: 1864-1871
Wei, Fushan (1)
;
Zhang, Zhenfeng (3)
;
Ma, Chuangui (1)
  |  
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2014/12/16
gateway
password
authentication
key exchange
cmqv+: an authenticated key exchange protocol from cmqv
期刊论文
OAI收割
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 卷号: 55, 期号: 7, 页码: 1666-1674
Li Hui
;
Wu ChuanKun
  |  
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2013/09/17
key exchange
eCK model
trapdoor-test technique
provable security
CDH assumption
dynamic tree-based authenticated group key exchange protocol
期刊论文
OAI收割
SCIENCE CHINA-INFORMATION SCIENCES, 2010, 卷号: 53, 期号: 8, 页码: 1591-1602
Li Hui
;
Wu ChuanKun
;
Teng Jikai
  |  
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2011/05/23
tree-based
group key exchange
dynamic
provable security
security model and modular design of fair authentication key exchange protocols
期刊论文
OAI收割
SCIENCE CHINA-INFORMATION SCIENCES, 2010, 卷号: 53, 期号: 2, 页码: 278-287
Feng DengGuo
;
Chen WeiDong
  |  
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2011/05/23
authentication key exchange protocols
deniability
fairness
concurrent signature
provable security