全文获取类型
收费全文 | 68篇 |
免费 | 26篇 |
国内免费 | 18篇 |
专业分类
电工技术 | 2篇 |
综合类 | 6篇 |
机械仪表 | 1篇 |
无线电 | 19篇 |
一般工业技术 | 5篇 |
冶金工业 | 1篇 |
自动化技术 | 78篇 |
出版年
2022年 | 2篇 |
2021年 | 1篇 |
2020年 | 2篇 |
2018年 | 1篇 |
2017年 | 4篇 |
2016年 | 3篇 |
2015年 | 4篇 |
2014年 | 8篇 |
2013年 | 6篇 |
2012年 | 14篇 |
2011年 | 15篇 |
2010年 | 7篇 |
2009年 | 16篇 |
2008年 | 7篇 |
2007年 | 11篇 |
2006年 | 2篇 |
2005年 | 1篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2001年 | 1篇 |
1999年 | 1篇 |
1996年 | 1篇 |
排序方式: 共有112条查询结果,搜索用时 15 毫秒
1.
2.
高效的具有指定验证者的代理签名方案* 总被引:3,自引:3,他引:0
基于计算性Diffie-Hellman问题的困难假设和司光东等人的短签名方案,构造了一个具有指定验证者的代理签名方案。该方案满足代理签名方案的各种安全性要求,同时具有签名长度短、效率高等优点,是一种安全且高效的代理签名方案。 相似文献
3.
4.
进入普适通信的时代,从车辆到心脏监听器等大量设备都需要与它们的环境彼此交流信息,从而对验证和安全通信的要求不断上升:①密码费用较低;②能够快速验证大量不同来源的消息;③隐私保护。文章针对一个高效的短群签名体制提出了一个批验证算法,其中验证运算的主要部分只需要2个双线性对,就可满足上面的全部3个要求。 相似文献
5.
标准模型下的限制性广义指定验证者签名 总被引:1,自引:0,他引:1
基于Waters签名方案,首次提出了一个在标准模型下安全的限制性广义指定验证者签名方案。在弱Gap双线性Diffie-Hellman问题困难假设下,该方案被证明是安全的。 相似文献
6.
A method is presented for checking secure information flow in Java bytecode, assuming a multilevel security policy that assigns security levels to the objects. The method exploits the type‐level abstract interpretation of standard bytecode verification to detect illegal information flows. We define an algorithm transforming the original code into another code in such a way that a typing error detected by the Verifier on the transformed code corresponds to a possible illicit information flow in the original code. We present a prototype tool that implements the method and we show an example of application. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
7.
8.
9.
A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme. 相似文献
10.
Certificateless cryptography addresses the private key escrow problem in identity-based systems, while overcoming the costly issues in traditional public key cryptography. Undeniable signature schemes were proposed with the aim of limiting the public verifiability of ordinary digital signatures. The first certificateless undeniable signature scheme was put forth by Duan. The proposed scheme can be considered as the certificateless version of the identity-based undeniable signature scheme which was introduced by Libert and Quisquater. In this paper, we propose a new scheme which is much more efficient comparing to Duan's scheme. Our scheme requires only one pairing evaluation for signature generation and provides more efficient confirmation and disavowal protocols for both the signer and the verifier. We also prove the security of our scheme in the strong security model based on the intractability of some well-known pairing-based assumptions in the random oracle model. 相似文献