全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Shenghui Su , Tao Xie , Shuwang Lü
来源:[J].Theoretical Computer Science(IF 0.489), 2016Elsevier
摘要:Abstract(#br)To examine the integrity and authenticity of an IP address efficiently and economically, this paper proposes a new non-iterative hash function called JUNA that is based on a multivariate permutation problem and an anomalous subset product problem to which no sub...
作者:Shenghui Su , Shuwang Lü ...
来源:[J].Theoretical Computer Science(IF 0.489), 2016Elsevier
摘要:Abstract(#br)This paper gives the definition and property of a bit-pair shadow, and devises the three algorithms of a public key cryptoscheme called JUOAN that is based on a multivariate permutation problem and an anomalous subset product problem to which no subexponential t...
作者:Shenghui Su , Shuwang Lü
来源:[J].Theoretical Computer Science(IF 0.489), 2012, Vol.426-427, pp.91-117Elsevier
摘要:Abstract(#br)In this paper, the authors give the definitions of a coprime sequence and a lever function, and describe the five algorithms and six characteristics of a prototypal public key cryptosystem which is used for encryption and signature, and is based on three new pro...
作者:Shenghui Su , Shuwang Lü , Xiubin Fan
来源:[J].Theoretical Computer Science(IF 0.489), 2011, Vol.412 (39), pp.5374-5386Elsevier
摘要:Abstract(#br)It is well known that the inverse function of y = x with the derivative y ′ = 1 is x = y , the inverse function of y = c with the derivative y ′ = 0 is nonexistent, and so on. Hence, on the assumption that the noninvertibility of the univariate increasing functi...
作者:Shenghui Su , Chao Li
来源:[J].Microvascular Research(IF 2.929), 2008, Vol.76 (3), pp.152-160Elsevier
摘要:Abstract(#br)Hyperglycaemia and the associated formation of advanced glycation end-products (AGE) have been implicated in the pathogenesis of diabetic vasculopathy. In addition to its role in coagulation, tissue factor (TF) is known to regulate vascular proliferation and angiogen...
作者:Guodong Sun , Shenghui Su
来源:[C].2013 AASRI Winter International Conference on Engineering and Technology(AASRI-WIET 2013)2013CNKI
摘要:Formal methods are one of the most important technologies to analyze and design authentication protocols.Kerberos protocol is a famous identity authentication protocol and it is widely used in the network.Although some fruitful formal verifications of the Kerberos protocol have b...
被引频次:-下载频次:-

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×