UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Zhou Z., Wang G., Liu Q., Jia W.. A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55(12), 2674-2684.
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite | TC[Scopus]:0 | Submit date:2019/04/04
Anonymous  Elliptic Curve Cryptography  Grouping-proof  Privacy  Rfid Security  
Efficient authentication protocol using elliptic curve with user anonymity for heterogeneous wireless networks Journal article
Jiang C., Jia W., Gu K.. Efficient authentication protocol using elliptic curve with user anonymity for heterogeneous wireless networks[J]. Journal of Information and Computational Science, 2012, 9(4), 1055-1061.
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite |  | Submit date:2019/02/11
Anonymous authentication  Elliptic curve  Group signature  Heterogeneous wireless networks  
Web Information Systems and Mining Book
Zhiguo Gong, Xiangfeng Luo, Junjie Chen, Jingsheng Lei, Fu Lee Wang. Web Information Systems and Mining[M]. Berlin:Springer, Berlin, Heidelberg, 2012.
Authors:  Zhiguo Gong;  Xiangfeng Luo;  Junjie Chen;  Jingsheng Lei;  Fu Lee Wang
Favorite | TC[Scopus]:1 | Submit date:2019/05/29
Association Rule Mining  Semantic Ontology  Genetic Algorithm  Elliptic Curve Cryptography  Distributed Computing