全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:... Fengwei Wang , Hao Li , Dengguo Feng
来源:[J].Information Sciences(IF 3.643), 2020, Vol.514, pp.244-262
摘要:Abstract(#br)With the promotion of online medical pre-diagnosis system, more and more research has begun to pay attention to the issue of privacy, and existing privacy-preserving schemes are designed for single-label data. However, medical users may infect many different diseases...
作者:Dengguo Feng , Hui Li ...
来源:[J].Ad Hoc Networks(IF 1.456), 2019, Vol.87, pp.49-60
摘要:Abstract(#br)To ensure secure and seamless handovers inter-Evolved Universal Terrestrial Radio Access Network (E-UTRAN) is a key issue in LTE-A networks. Due to the introduction of Home Evolved NodeB (HeNB), there are three different access modes for the HeNB and the mobility sce...
作者:... Yu Qin , Shijun Zhao , Dengguo Feng
来源:[J].Computer Networks(IF 1.231), 2018, Vol.134, pp.167-182
摘要:Abstract(#br)With the rise of Internet of Things (IoT) and Cyber-Physical Systems (CPS), the need for smart embedded devices is rapidly increasing, and so does the security and privacy risk. This paper focuses on enabling both remote attestation and authentication of current comm...
作者:Dengguo Feng
来源:[J].Theoretical Computer Science(IF 0.489), 1999, Vol.226 (1), pp.37-43
摘要:Abstract(#br)This paper presents three characterizations of correlation-immune functions over the rings Z N . We also show a method for constructing correlation-immune functions over the rings Z N .
作者:... Yi Deng , Xiaoshan Sun , Dengguo Feng
来源:[J].Computers & Security(IF 1.158), 2014, Vol.47, pp.26-40
摘要:Abstract(#br)Access control mechanisms (ACMs) have been widely used by operating systems (OSes) to protect information security. However, it is often challenging to evaluate and compare the quality of protection (QoP) of ACMs, especially when they are deployed on different OS pla...
作者:Mingsheng Wang , Dengguo Feng
来源:[J].Linear Algebra and Its Applications(IF 0.968), 2004, Vol.390, pp.279-285
摘要:Abstract(#br)This paper study generalized Serre problem proposed by Lin and Bose in multidimensional system theory context [Multidimens. Systems and Signal Process. 10 (1999) 379; Linear Algebra Appl. 338 (2001) 125]. This problem is stated as follows. Let F ∈ A l × m be a f...
作者:Zhenfeng Zhang , Dengguo Feng
来源:[J].Applied Mathematics and Computation(IF 1.349), 2004, Vol.170 (1), pp.103-114
摘要:Abstract(#br)The notion of a self-certified public key was introduced by Girault in 1991. Recently, Tseng, Jan and Chien proposed a digital signature scheme with message recovery and some variants extended from the self-certified public key system proposed by Girault. A trus...
作者:... Qianying Zhang , Yu Qin , Dengguo Feng
来源:[J].Security and Communication Networks(IF 0.311), 2015, Vol.8 (3), pp.383-395
摘要:Abstract(#br)The new released trusted platform module (TPM) specification, TPM2.0, adds cryptographic support for key exchange by providing SM2 authenticated key exchange (AKE) application programming interface (API) commands. Xu analyzed the SM2 AKE protocol and found that ...
作者:Hailong Zhang , Yongbin Zhou , Dengguo Feng
来源:[J].Security and Communication Networks(IF 0.311), 2015, Vol.8 (5), pp.769-777
摘要:Abstract(#br)Under the assumption that power leakages at different interesting points follow multivariate normal distribution , maximum likelihood principle (MLP) can be used as an efficient distinguisher for template attack (TA). Therefore, in key‐recovery, one uses MLP to ...
作者:... Yongbin Zhou , Hailong Zhang , Dengguo Feng
来源:[J].Security and Communication Networks(IF 0.311), 2016, Vol.9 (16), pp.3116-3126
摘要:Abstract(#br)Under the assumption that one has a reference device identical or similar to the target device, and thus be well capable of characterizing power leakages of the target device, template attacks are widely accepted to be the most powerful side‐channel attacks. How...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×