UM

Browse/Search Results:  1-5 of 5 Help

Selected(0)Clear Items/Page:    Sort:
Secure and efficient multi-proxy signature scheme in the standard model Journal article
Gu K., Jia W., Deng Y., Nie X.. Secure and efficient multi-proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2016, 25(1), 93-99.
Authors:  Gu K.;  Jia W.;  Deng Y.;  Nie X.
Favorite | TC[WOS]:4 TC[Scopus]:4 | Submit date:2019/02/11
Computational Diffie-hellman (Cdh) Assumption  Efficiency  Multi-proxy Signature  Provable Security  
Distributional escape time algorithm based on generalized fractal sets in cloud environment Journal article
Liu M., Liu S., Fu W., Zhou J.. Distributional escape time algorithm based on generalized fractal sets in cloud environment[J]. Chinese Journal of Electronics, 2015, 24(1), 124-127.
Authors:  Liu M.;  Liu S.;  Fu W.;  Zhou J.
Favorite | TC[WOS]:10 TC[Scopus]:27 | Submit date:2018/12/22
Cloud Environment  Distribution Probability Model  Escape Time Algorithm  Fractal  
Secure and efficient proxy signature scheme in the standard model Journal article
Gu K., Jia W., Chen R., Liu X.. Secure and efficient proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2013, 22(4), 666-670.
Authors:  Gu K.;  Jia W.;  Chen R.;  Liu X.
Favorite |  | Submit date:2019/02/11
Computational diffle-hellman (cdh) assumption  Efficiency  Provable security  Proxy signature  Security model  
Anonymous authentication without home server in mobile roaming networks Journal article
Jiang C., Jia W., Gu K., Xu N.. Anonymous authentication without home server in mobile roaming networks[J]. Chinese Journal of Electronics, 2013, 22(2), 382-386.
Authors:  Jiang C.;  Jia W.;  Gu K.;  Xu N.
Favorite |  | Submit date:2019/02/11
Anonymous authentication  Group signature  Key exchange  Mobile roaming networks  
Data clustering analysis based on wavelet feature extraction Journal article
Qian Y., Tang Y.. Data clustering analysis based on wavelet feature extraction[J]. Chinese Journal of Electronics, 2003, 12(3), 441-446.
Authors:  Qian Y.;  Tang Y.
Favorite |  | Submit date:2019/02/11
Cluster growing  Clustering analysis  Clustering criteria  Wavelet transform