×
Verification Code:
换一张
Forgotten Password?
Stay signed in
×
Login
中文
|
English
BNBU
|
Library
Login
Register
Home
Publications
Faculty/School
Scholars
Analysis
Search
ALL
ORCID
Title
Creator
Date Issued
Keyword
Document Type
Original Document Type
Indexed By
Publisher
Status
Collection
Research outside affiliate...
12
Authors
JIA Weijia
11
Document Type
Journal article
11
Conference paper
1
Date Issued
2013
3
2012
6
2011
2
2010
1
Language
英语English
7
中文Chinese
5
Indexed By
CSCD
5
中文核心期刊要目总览
5
EI
3
SCIE
2
Funding Organization
Keyword
CDHP
4
Proxy signature
4
Anonymous authentication
3
CDH问题
3
Group signature
3
Provable security
3
More...
Source Publication
小型微型计算机系统/Journal of Chines...
2
Advanced Science Letters
1
Chinese Journal of Electron...
1
Computer Journal
1
Jisuanji Yanjiu yu Fazhan/C...
1
Journal of Computational In...
1
More...
Funding Project
×
Knowledge Map
Feedback
Browse/Search Results: 1-10 of 12
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
Issue Date Ascending
Issue Date Descending
Anonymous authentication without home server in mobile roaming networks
Journal article
Chinese Journal of Electronics,2013, volume: 22, issue: 2, pages: 382-386
Authors:
Jiang, Chunlin
;
Jia, Weijia
;
Gu, Ke
;
Xu, Ning
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/05/10
Anonymous authentication
Group signature
Key exchange
Mobile roaming networks
无双线性对的可证安全的高效的代理签名方案
Journal article
小型微型计算机系统/Journal of Chinese Computer Systems,2013, volume: 34, issue: 6, pages: 1382-1386
Authors:
谷科
;
贾维嘉
;
李超良
;
姜春林
Favorite
  |  
View/Download:0/0
  |  
Submit date:2021/09/16
代理签名
可证安全性
效率
EDL签名
归约
proxy signature
provable security
efficiency
EDL signature
reduction
Efficient identity-based proxy signature in the standard model
Journal article
Computer Journal,2013, volume: 58, issue: 4, pages: 792-807
Authors:
Gu, Ke
;
Jia, Weijia
;
Jiang, Chunlin
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/05/10
efficiency
identity-based cryptography
identity-based proxy signature
proxy signature
security model
Efficient authentication protocol using elliptic curve with user anonymity for heterogeneous wireless networks
Journal article
Journal of Information and Computational Science,2012, volume: 9, issue: 4, pages: 1055-1061
Authors:
Jiang, Chunlin
;
Jia, Weijia
;
Gu, Ke
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/05/10
Anonymous authentication
Elliptic curve
Group signature
Heterogeneous wireless networks
An anonymous wireless authentication protocol based on proxy signature
Journal article
Journal of Computational Information Systems,2012, volume: 8, issue: 2, pages: 541-548
Authors:
Jiang, Chunlin
;
Jia, Weijia
;
Gu, Ke
Favorite
  |  
View/Download:6/0
  |  
Submit date:2021/05/10
Anonymity
Authentication
Key exchange
Proxy signature
Anonymous authentication based on mobile roaming network
Journal article
Advanced Science Letters,2012, volume: 7, pages: 95-97
Authors:
Jiang, Chunlin
;
Jia, Weijia
;
Gu, Ke
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/05/10
Anonymous authentication
Group signature
Roaming network
Wireless communication
A group proxy signature scheme based on sub-secret evolution
Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,2012, volume: 49, issue: 5, pages: 962-973
Authors:
Gu,Ke
;
Jia,Weijia
;
Jiang,Chunlin
Favorite
  |  
View/Download:0/0
  |  
Submit date:2022/06/17
CDHP
Cellular automata
Provable security
Proxy signature
Sub-secret evolution
一种子秘密演化的群体代理签名方案
Journal article
计算机研究与发展/Computer Research and Development,2012, volume: 49, issue: 5, pages: 962-973
Authors:
谷科
;
贾维嘉
;
姜春林
Favorite
  |  
View/Download:4/0
  |  
Submit date:2021/05/10
CDHP
Cellular automata
Provable security
Proxy signature
Sub-secret evolution
子秘密演化
代理签名
CDH问题
细胞自动机
可证安全
实用的移动网络匿名认证协议
Journal article
小型微型计算机系统/Journal of Chinese Computer Systems,2012, volume: 33, issue: 7, pages: 1418-1421
Authors:
姜春林
;
贾维嘉
;
谷科
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/09/16
票据
匿名认证
CK模型
ticket
mobile networks
anonymous authentication
CK model
移动网络
高效安全的基于身份的签名方案
Journal article
软件学报/Journal of Software,2011, volume: 22, issue: 6, pages: 1350-1360
Authors:
谷科
;
贾维嘉
;
姜春林
Favorite
  |  
View/Download:6/0
  |  
Submit date:2021/05/10
CDHP
Computational efficiency
Provable security
Signature
Standard model
标准模型
签名
CDH问题
可证安全
计算性能