×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
个人在本单位外知识产出
17
作者
陈钟
16
文献类型
期刊论文
16
会议论文
1
发表日期
2014
1
2013
6
2012
7
2011
3
语种
英语English
17
收录类别
SCIE
10
CPCI-S
1
资助机构
关键词
Authentication
4
Certificateless cryptography
3
Aggregate signature
2
Information security
2
Key agreement
2
Message authentication
2
更多...
出处
Computers and Electrical En...
3
Information Sciences
3
International Journal of Co...
2
International Journal of Ne...
2
Control and Cybernetics
1
Cryptology and Information ...
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共17条,第1-10条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
WOS被引频次升序
WOS被引频次降序
发表日期升序
发表日期降序
题名升序
题名降序
作者升序
作者降序
Certificate-free ad hoc anonymous authentication
期刊论文
Information Sciences,2014, 卷号: 268, 页码: 447-457
作者:
Qin,Zhiguang
;
Xiong,Hu
;
Zhu,Guobin
;
Chen,Zhong
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2025/08/05
Anonymous authentication
Certificateless cryptography
Information security
Ring signature
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
期刊论文
Information Sciences,2013, 卷号: 235, 页码: 329-340
作者:
Xiong, Hu
;
Chen, Yanan
;
Guan, Zhi
;
Chen, Zhong
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2025/08/05
Authentication
Key Compromise Impersonation (KCI) attack
Password-based
Three-party key exchange
An efficient certificateless aggregate signature with constant pairing computations
期刊论文
Information Sciences,2013, 卷号: 219, 页码: 225-235
作者:
Xiong, Hu
;
Guan, Zhi
;
Chen, Zhong
;
Li, Fagen
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2025/08/05
Aggregate signature
Certificateless cryptography
Message authentication
Simple three-party password-based key exchange protocol with provable security
期刊论文
International Journal of Computers and Applications,2013, 卷号: 35, 期号: 1, 页码: 44-50
作者:
Xiong, Hu
;
Chen, Yanan
;
Chen, Zhong
;
Li, Fagen
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2025/08/05
Authentication
Password-based
Provable security
Three-party key exchange
Security flaw of an ECC-based signcryption scheme with anonymity
期刊论文
International Journal of Network Security,2013, 卷号: 15, 期号: 4, 页码: 317-320
作者:
Xiong, Hu
;
Hu, Jianbin
;
Chen, Zhong
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2025/08/05
Anonymous
Chosen plaintext attack
ECC-based cryptosystem
Signcryption
Efficient communication scheme with confidentiality and privacy for vehicular networks
期刊论文
Computers and Electrical Engineering,2013, 卷号: 39, 期号: 6, 页码: 1717-1725
作者:
Xiong, Hu
;
Zhu, Guobin
;
Chen, Zhong
;
Li, Fagen
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2025/08/05
New identity-based three-party authenticated key agreement protocol with provable security
期刊论文
Journal of Network and Computer Applications,2013, 卷号: 36, 期号: 2, 页码: 927-932
作者:
Xiong, Hu
;
Chen, Zhong
;
Li, Fagen
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2025/08/05
Authentication
Identity-based
Information security
Key agreement
Provable security
Three-party
Further improvement of an authentication scheme with user anonymity for wireless communications
期刊论文
International Journal of Network Security,2012, 卷号: 14, 期号: 5, 页码: 297-300
作者:
Hu, Jianbin
;
Xiong, Hu
;
Chen, Zhong
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2025/08/05
Anonymity
Cryptanalysis
User authentication
Wireless communication
Bidder-anonymous English auction protocol based on revocable ring signature
期刊论文
Expert Systems with Applications,2012, 卷号: 39, 期号: 8, 页码: 7062-7066
作者:
Xiong, Hu
;
Chen, Zhong
;
Li, Fagen
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2025/08/05
Conditional anonymity
English auction
Revocable ring signature
Unforgeability
On the security of a pairing-based signcryption scheme using self-certified public keys
期刊论文
International Journal of Computers and Applications,2012, 卷号: 34, 期号: 1, 页码: 55-57
作者:
Xiong, Hu
;
Guan, Zhi
;
Chen, Zhong
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2025/08/05
Key escrow
Malicious PKG
Self-certified public keys
Signcryption