ON-LINE/OFF-LINE

作品数:3被引量:6H指数:1
导出分析报告
相关领域:自动化与计算机技术更多>>
相关期刊:《Chinese Journal of Electronics》《International Journal of Communications, Network and System Sciences》更多>>
相关基金:国家自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-3
视图:
排序:
On-line/Off-line Threshold Proxy Re-Signatures被引量:5
《Chinese Journal of Electronics》2014年第2期248-253,共6页YANG Xiaodong WANG Caifen ZHANG Lei QIU Jianbin 
supported in part by the National Natural Science Foundation of China(No.61262057,No.61063041,No.61163038);the Young Teachers’Scientific Research Ability Promotion Program of Northwest Normal University(No.NWNU-LKQN-10-22)
To improve the performance of threshold proxy re-signatures, the notion of on-line/off-line threshold proxy re-signatures is introduced. The bulk of re-signature computation can be done in the off-line phase before th...
关键词:ON-LINE/OFF-LINE Threshold proxy re- signature Chameleon hash function Standard model Ex- istential unforgeability. 
A New On-Line/Off-Line Adaptive Antenna Array Beamformer for Tracking the Mobile Targets
《International Journal of Communications, Network and System Sciences》2011年第5期304-312,共9页Shahriar Shirvani Moghaddam Mahyar Shirvani Moghaddam 
An adaptive antenna array system adjusts the main lobe of radiation pattern in the direction of desired signal and points the nulls in the direction of undesired signals or interferers. The essential goal of beamformi...
关键词:BEAMFORMING Adaptive Antenna Array LMS CM Training-Based BLIND 
A New Efficient On-line/Off-line Threshold Signature Scheme被引量:1
《Chinese Journal of Electronics》2009年第2期321-324,共4页WU Chunhui CHEN Xiaofeng LONG Dongyang 
This work is supported by the National Natural Science Foundation of China (No.60503006, No.60573039) and Program of Science and Technology of Guangzhou, China (No.2008J1-C231-2).
It seems that all existing on-line/offline (threshold) signature schemes based on Shamir- Tauman's paradigm suffer from the key exposure problem of chameleon hashing. In this paper, we firstly propose a new efficie...
关键词:ON-LINE/OFF-LINE Threshold signatures Chameleon hash functions Key exposure problem. 
检索报告 对象比较 聚类工具 使用帮助 返回顶部