VERIFIER

作品数:21被引量:23H指数:3
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:周福才常桂然柳秀梅更多>>
相关机构:铿腾电子科技有限公司东北大学中国航发控制系统研究所深圳市海思半导体有限公司更多>>
相关期刊:《航空计算技术》《The Journal of China Universities of Posts and Telecommunications》《Journal of Southeast University(English Edition)》《Journal of Computer and Communications》更多>>
相关基金:国家自然科学基金国家高技术研究发展计划国家教育部博士点基金国防科技工业技术基础科研项目更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
How can the holder trust the verifier?A CP-ABPRE-based solution to control the access to claims in a Self-Sovereign-Identity scenario
《Blockchain(Research and Applications)》2024年第3期22-41,共20页Francesco Buccafurri Vincenzo De Angelis Roberto Nardone 
supported by the project STRIDE included in the Spoke 5(Cryptography and Distributed Systems Security)of the Re-search and Innovation Program PE00000014-H73C22000880001,“SE-curity and RIghts in the CyberSpace(SERICS)”,under the National Recovery and Resilience Plan,funded by the European Union,NextGen-erationEU.
The interest in Self-Sovereign Identity(SSI)in research,industry,and governments is rapidly increasing.SSI is a paradigm where users hold their identity and credentials issued by authorized entities.SSI is revolutioni...
关键词:Blockchain IPFS Self Sovereign Identity Smart contract Access control 
Hierarchical group signature with verifier-local revocation revisited被引量:1
《Science China(Information Sciences)》2022年第8期278-280,共3页Lin HOU Dongdai LIN Renzhang LIU 
supported by National Natural Science Foundation of China(Grant Nos.61872359,61936008).
Dear editor,Group signature(GS)[1]is a milestone in privacy-oriented cryptography,which provides authentication for messages and keeps signers anonymous.Trolin and Wikstr¨om[2]properly generalized GS into the notion ...
关键词:SIGNATURE PROPERLY notion 
Verifier-local revocation group signatures with backward unlinkability from lattices
《Frontiers of Information Technology & Electronic Engineering》2022年第6期876-892,共17页Yanhua ZHANG Ximeng LIU Yupu HU Yong GAN Huiwen JIA 
the National Natural Science Foundation of China(Nos.61802075 and 61772477);the Natural Science Foundation of Henan Province,China(Nos.222300420371 and202300410508)。
For group signature(GS)supporting membership revocation,verifier-local revocation(VLR)mechanism seems to be a more flexible choice,because it requires only that verifiers download up-to-date revocation information for...
关键词:Group signature Lattice-based cryptography Verifier-local revocation Backward unlikability Short integer solution 
A Two-Party Password-Authenticated Key Exchange Protocol with Verifier
《Journal of Computer and Communications》2021年第4期102-109,共8页Shunbo Xiang Bing Xu Ke Chen 
To tackle with the security lack in the password-authenticated key exchange protocol, this paper proposes a two-party password-authenticated key exchange protocol based on a verifier. In the proposed protocol, a user ...
关键词:VERIFIER Password-Authenticated Key Exchange Fake Attack Dictionary Attack Session Key 
ADE Verifier在项目移植、管理和验证中的应用
《中国集成电路》2019年第1期47-56,共10页蒋佳君 黄志荣 吕波 孙金铎 
Cadence公司对本项目的巨大付出
ADE Verifier是Cadence New ADE家庭成员中的重要一员,它主要用于项目管理和验证。Verifier主要功能;(1)可以在I C设计项目中统一管理仿真case与指标对应关系,手动/自动刷新ADE的最新仿真结果并显示其指标通过情况;(2)还可以通过一键完...
关键词:VERIFIER VIRTUOSO NewADE MatlabIntegration IC 项目移植 项目管理 项目验证 
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment被引量:3
《China Communications》2018年第2期122-137,共16页Jing Zhan Xudong Fan Lei Cai Yaqi Gao Junxi Zhuang 
partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002);the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001);the National Key Research and Development Program of China (Grant No. 2016YFB0800204);the National Science Foundation of China (No. 61502017);the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in ...
关键词:big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party 
Lattice-Based Group Signature with Verifier-Local Revocation被引量:1
《Journal of Shanghai Jiaotong university(Science)》2017年第3期313-321,共9页高雯 胡予濮 张彦华 王保仓 
the National Natural Science Foundations of China(Nos.61472309,61672412,61572390and 61402353);the 111 Project(No.B08038);Research Program of Anhui Education Committee(Nos.KJ2016A626,KJ2016A627)
Among several post quantum primitives proposed in the past few decades, lattice-based cryptography is considered as the most promising one, due to its underlying rich combinatorial structure, and the worst-case to ave...
关键词:lattice-based member revocation digital signature 
基于模型的FADEC软件结构覆盖率分析被引量:2
《航空计算技术》2017年第2期93-96,共4页赵飞 张杰 
国防科工局技术基础科研项目资助(JSZL2015601C008)
结构覆盖率分析是基于需求测试的补充和完善,能够发现软件中是否存在预期外的功能。在基于模型的软件开发过程中,模型覆盖率代替了传统的代码覆盖率,运用模型检查技术自动生成测试用例是形式化方法在模型覆盖率测试中的主要途径,涵盖了...
关键词:DO-178C 覆盖率分析 MC/DC SIMULINK Design Verifier工具 FADEC软件 
Position based key exchange:definitions and implementations
《Journal of Communications and Information Networks》2016年第4期33-43,共11页ZHANG Junwei DU Fangqiong MA Jianfeng YANG Chao 
This work is supported by the National High Technology Research and Development Program of China(863 Program)(No.2015AA016007);the National Natural Science Foundation of China(Nos.U1405255,61472310,61372075).
Chandran,et al.introduce the direction of position based cryptography at CRYPTO 2009.In position based cryptography,the position of a party is used to be its unique“credential”in order to realize the cryptographic t...
关键词:position based key exchange position based cryptography prover-to-verifier prover-to-prover bounded retrieval model 
Verifier提高验证完备性
《电子技术应用》2016年第8期37-40,43,共5页林慧 蒋武 熊熙 李元祝 黄志荣 
随着集成电路设计技术的不断发展,电路设计中经常出现一些问题。因此,设计验证技术成为了电路设计中不可或缺的部分。如何提高验证完备性,是验证技术的难题之一。本文介绍了Cadence最新发布的适用于模拟设计的ADE Verifier的工具使用流...
关键词:电路设计 验证完备性 ADE VERIFIER 
检索报告 对象比较 聚类工具 使用帮助 返回顶部