您当前的位置:
首页 >
文章列表页 >
Security analysis and improvement of two attribute-based signature schemes
Contents Papers | 更新时间:2024-06-05
    • Security analysis and improvement of two attribute-based signature schemes

    • Journal on Communications   Vol. 37, Issue Z1, Pages: 168-173(2016)
    • DOI:10.11959/j.issn.1000-436x.2016263    

      CLC: TP309
    • Online First:2016-10

      Published:25 October 2016

    移动端阅览

  • Xiao YANG, Guang-li XIANG, Jiang-hong WEI, et al. Security analysis and improvement of two attribute-based signature schemes[J]. Journal on Communications, 2016, 37(Z1): 168-173. DOI: 10.11959/j.issn.1000-436x.2016263.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1338

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

AEUR: authenticated encryption algorithm design based on uBlock round function
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
Security flaws and improvement to a wireless authentication protocol with anonymity

Related Author

Yatao YANG
Hui DONG
Jiantao LIU
Yanshuo ZHANG
Ting WU
Chengnan HU
Qingnan CHEN
Anbang CHEN

Related Institution

Department of Electronic and Communication Engineering, Beijing Electronic Science and Technology Institute
School of Telecommunication Engineering, Xidian University
School of Cyberspace Security, Hangzhou Dianzi University
Hangzhou Innovation Institute, Beihang University
School of Computer Science and Technology,University of Science and Technology of China
0