PREDICATE

作品数:45被引量:25H指数:3
导出分析报告
相关作者:陈立军桂永霞唐世渭杨冬青杨慧林更多>>
相关机构:广东女子职业技术学院北京大学中国人民大学西华师范大学更多>>
相关期刊:《天津外国语大学学报》《International Journal of Digital Earth》《Frontiers of Computer Science》《US-China Foreign Language》更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家高技术研究发展计划中国科学院科研项目更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Cybersecurityx
条 记 录,以下是1-2
视图:
排序:
Predicate encryption against master-key tampering attacks
《Cybersecurity》2019年第1期329-348,共20页Yuejun Liu Rui Zhang Yongbin Zhou 
This work was supported in part by National Natural Science Foundation of China(No.61632020,61472416,61772520);National key research and development program of China(No.2017YFB0802705);Key Research Project of Zhejiang Province(No.2017C01062);Fundamental Theory and Cutting-edge Technology Research Program of Institute of Information Engineering,CAS(No.Y7Z0321102).
Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key...
关键词:Tampering resilience Predicate encryption Pair encoding Dual system encryption 
Predicate encryption against master-key tampering attacks
《Cybersecurity》2018年第1期632-651,共20页Yuejun Liu Rui Zhang Yongbin Zhou 
supported in part by National Natural Science Foundation of China(No.61632020,61472416,61772520);National key research and development program of China(No.2017YFB0802705);Key Research Project of Zhejiang Province(No.2017C01062);Fundamental Theory and Cutting-edge Technology Research Program of Institute of Information Engineering,CAS(No.Y7Z0321102).
Many real world attacks often target the implementation of a cryptographic scheme,rather than the algorithm itself,and a system designer has to consider new models that can capture these attacks.For example,if the key...
关键词:Tampering resilience Predicate encryption Pair encoding Dual system encryption 
检索报告 对象比较 聚类工具 使用帮助 返回顶部