×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Authors
Document Type
Journal article [7]
Date Issued
2016 [1]
2013 [2]
2012 [3]
2011 [1]
Language
英語English [7]
Source Publication
Chinese Journal ... [2]
Jisuanji Yanjiu ... [2]
Journal of Compu... [1]
Ruan Jian Xue Ba... [1]
Sichuan Daxue Xu... [1]
Indexed By
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-7 of 7
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Secure and efficient multi-proxy signature scheme in the standard model
Journal article
Gu K., Jia W., Deng Y., Nie X.. Secure and efficient multi-proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2016, 25(1), 93-99.
Authors:
Gu K.
;
Jia W.
;
Deng Y.
;
Nie X.
Favorite
|
TC[WOS]:
4
TC[Scopus]:
4
|
Submit date:2019/02/11
Computational Diffie-hellman (Cdh) Assumption
Efficiency
Multi-proxy Signature
Provable Security
Secure and efficient proxy signature scheme in the standard model
Journal article
Gu K., Jia W., Chen R., Liu X.. Secure and efficient proxy signature scheme in the standard model[J]. Chinese Journal of Electronics, 2013, 22(4), 666-670.
Authors:
Gu K.
;
Jia W.
;
Chen R.
;
Liu X.
Favorite
|
|
Submit date:2019/02/11
Computational diffle-hellman (cdh) assumption
Efficiency
Provable security
Proxy signature
Security model
Identity-based group proxy signature scheme in the standard model
Journal article
Gu K., Jia W., Li C., Chen R.. Identity-based group proxy signature scheme in the standard model[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(7), 1370-1386.
Authors:
Gu K.
;
Jia W.
;
Li C.
;
Chen R.
Favorite
|
|
Submit date:2019/02/11
CDH problem
Group proxy signature
Identity
Provable security
Security model
Proxy signature in the standard model: constructing security model and proving security
Journal article
Gu K., Jia W.-J., Wang S.-C., Shi L.-W.. Proxy signature in the standard model: constructing security model and proving security[J]. Ruan Jian Xue Bao/Journal of Software, 2012, 23(9), 2416-2429.
Authors:
Gu K.
;
Jia W.-J.
;
Wang S.-C.
;
Shi L.-W.
Favorite
|
TC[Scopus]:
2
|
Submit date:2019/02/11
Cdhp
Identity
Provable Security
Proxy Signature
A group proxy signature scheme based on sub-secret evolution
Journal article
Gu K., Jia W., Jiang C.. A group proxy signature scheme based on sub-secret evolution[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2012, 49(5), 962-973.
Authors:
Gu K.
;
Jia W.
;
Jiang C.
Favorite
|
|
Submit date:2019/02/11
CDHP
Cellular automata
Provable security
Proxy signature
Sub-secret evolution
An anonymous wireless authentication protocol based on proxy signature
Journal article
Jiang C., Jia W., Gu K.. An anonymous wireless authentication protocol based on proxy signature[J]. Journal of Computational Information Systems, 2012, 8(2), 541-548.
Authors:
Jiang C.
;
Jia W.
;
Gu K.
Favorite
|
|
Submit date:2019/02/11
Anonymity
Authentication
Key exchange
Proxy signature
A group proxy signature scheme based on key matrix
Journal article
Gu K., Jia W.-J., Jiang C.-L.. A group proxy signature scheme based on key matrix[J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2011, 43(4), 108-115.
Authors:
Gu K.
;
Jia W.-J.
;
Jiang C.-L.
Favorite
|
|
Submit date:2019/02/11
Bilinear transformation
CDHP
Key matrix
Proxy signature