助手标题
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
共[1635]条 当前为第61条到80条[由于搜索限制,当前仅支持显示前5页数据]
 

相关语句
secure
A secure proxy signature scheme based on elliptic curve cryptosystem
      
This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy signature scheme based on elliptic curve cryptosystem.
      
Contrast with universal proxy signature schemes, they are secure against key substitute attack even if there is not a certificate authority in the system, and also secure against the original signer's forgery attack.
      
A novel approach of secure communication based on the technique of speech information hiding
      
This approach is more reliable, covert and securable than traditional and chaotic secure communication.
      
Both schemes are proven to be secure against adaptive chosen message attack in the random oracle model under the normal security notions with the assumption that the Computational Diffie-Hellman problem is hard in the m-torsion groups.
      
As a major practical result, the paper shows that it is possible to implement public-key cryptosystem at secure bit lengths on a single commercially available FPGA.
      
An efficient and secure (t, n) threshold secret sharing scheme
      
Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each participant and the dealer.
      
Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all.
      
Analyses show that this scheme is a computationally secure and efficient scheme.
      
The paper also constructs the first concrete ring proxy signature scheme based on the provably secure Schnorr's signatures and two ID-based ring proxy signature schemes.
      
Distributed certification via threshold cryptography is much more secure than other ways to protect certification authority (CA)'s private key, and can tolerate some intrusions.
      
Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure.
      
Therefore we conclude that the signature scheme is not secure.
      
The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.
      
By using this overlay network architecture, P2P systems are robust, efficient, scalable and secure.
      
However, more black patients were readmitted on forensic sections and from prison, and more were treated in secure units.
      
Not feeling secure in daily life was a strong riks indicator for psychological distress, with an estimated odds ratio of 3.29 (1.90-5.45).
      
There was a significant association between discrimination, not feeling secure in everyday life and psychological distress, with estimated odds ratios of 1.93(1.02-3.56) and 3.23(1.62-6.16), respectively.
      
 

首页上一页12345下一页尾页 

 
CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社