[1] |
JIA Shijie, XIA Luning, WEN Nan.
Signature private key generation method based on the physical properties of Nand Flash and its applications
[J]. , 2015, 32(5): 695-700.
|
[2] |
ZHANG Yan, ZHANG Liwu, ZHANG Moli.
Efficient attribute-based signature with constant signature size
[J]. , 2015, 32(5): 708-713.
|
[3] |
ZHANG Mingqing, ZHANG Can, CHEN Deyuan, ZHANG Kenan.
A mobile classification security method for SMS based on Android system
[J]. , 2015, 32(2): 281-287.
|
[4] |
ZHANG Ge-Fei, ZHANG Yu-Qing.
Provably secure certificateless anonymous authentication protocol for P2P-SIP based on IPv6
[J]. , 2013, 30(4): 547-554.
|
[5] |
LI Ling, LI Jing, XU Lin, WANG Wei-Wei.
Privacy protection of user identities in cloud computing
[J]. , 2013, 30(1): 98-105.
|
[6] |
ZHAO Yan, LIN Dong-Dai.
Nonsingular circulant matrices over finite fields
[J]. , 2012, (6): 805-814.
|
[7] |
ZHAO Yong-Bin, FAN Tong-Rang.
Simple proof of bit security for NTRU
[J]. , 2011, 28(6): 832-836.
|
[8] |
LI Ming, WANG Kun-Peng.
Cryptosystem based on elliptic curve over local ring Z/pZ
[J]. , 2009, 26(5): 695-702.
|
[9] |
WU Jing-Jing, JING Ji-Wu, WANG Yue-Wu, LIN Jing-Qiang, Liu Yi-Cong.
Trust model for Public Key Infrastructure in the real-world environment
[J]. , 2009, 26(3): 389-399.
|
[10] |
Yang Fu-Rong , Liu Chang-Jin.
UCKG-based key management protocol
[J]. , 2008, 25(5): 615-619.
|
[11] |
GUO Li-Feng, LI Yong, HU Lei.
Cryptanalysis of a signature scheme without using one-way Hash functions
[J]. Journal of University of Chinese Academy of Sciences, 2008, 25(5): 698-700.
|
[12] |
ZHOU Su-Jing, LIN Dong-Dai.
Comments on an efficient group signature scheme
[J]. , 2007, 24(3): 316-319.
|
[13] |
DU Hong-Zhen, LI Yan-Ping, ZHANG Jian-Zhong.
An Optimistic Fair Non-Repudiation Protocol with Semi-Trusted Third Party
[J]. , 2006, 23(3): 377-381.
|
[14] |
LUO Wen-Jun, LONG Shi-Gong.
Security Analysis and Improvement of a Message Recovery Signature Scheme
[J]. , 2005, 22(2): 197-201.
|
[15] |
Lin Jingqiang, Feng Dengguo.
Temporary RSA Key and OCSP Server Implementation
[J]. , 2005, 22(1): 59-63.
|