全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Shenghui Su , Tao Xie , Shuwang Lü
来源:[J].Theoretical Computer Science(IF 0.489), 2016
摘要:Abstract(#br)To examine the integrity and authenticity of an IP address efficiently and economically, this paper proposes a new non-iterative hash function called JUNA that is based on a multivariate permutation problem and an anomalous subset product problem to which no sub...
作者:Shenghui Su , Shuwang Lü ...
来源:[J].Theoretical Computer Science(IF 0.489), 2016
摘要:Abstract(#br)This paper gives the definition and property of a bit-pair shadow, and devises the three algorithms of a public key cryptoscheme called JUOAN that is based on a multivariate permutation problem and an anomalous subset product problem to which no subexponential t...
作者:Shenghui Su , Shuwang Lü , Xiubin Fan
来源:[J].Theoretical Computer Science(IF 0.489), 2011, Vol.412 (39), pp.5374-5386
摘要:Abstract(#br)It is well known that the inverse function of y = x with the derivative y ′ = 1 is x = y , the inverse function of y = c with the derivative y ′ = 0 is nonexistent, and so on. Hence, on the assumption that the noninvertibility of the univariate increasing functi...
作者:Shenghui Su , Shuwang Lü
来源:[J].Theoretical Computer Science(IF 0.489), 2012, Vol.426-427, pp.91-117
摘要:Abstract(#br)In this paper, the authors give the definitions of a coprime sequence and a lever function, and describe the five algorithms and six characteristics of a prototypal public key cryptosystem which is used for encryption and signature, and is based on three new pro...
作者:Shenghui Su , Chao Li
来源:[J].Microvascular Research(IF 2.929), 2008, Vol.76 (3), pp.152-160
摘要:Abstract(#br)Hyperglycaemia and the associated formation of advanced glycation end-products (AGE) have been implicated in the pathogenesis of diabetic vasculopathy. In addition to its role in coagulation, tissue factor (TF) is known to regulate vascular proliferation and angiogen...
作者:Shenghui Su , Bingru Yang
来源:[J].Wuhan University Journal of Natural Sciences, 2007, Vol.12 (1), pp.172-176
摘要:Abstract(#br)Different from the extended Euclidean algorithm which can compute directly only the multiplicative inverse of an element in Z * m and the greatest common divisor of two integers, a recursive algorithm called REESSE is designed by the authors, which can not only seek ...
作者:Jiankang Chen , Shenghui Su
来源:[C].iccsee-132013
摘要:IBE (Identity-based Encryption) technology, no digital certificates, is user-friendly and convenient for back-office management. It simplifies the key management process of a public key cryptosystem and diminishes the cost of application. This paper presents the thought of I...
作者:Guodong Sun , Shenghui Su
来源:[C].Proceedings of the AASRI Winter International Conference on Engineering and Technology (AASRI-WIET 2013)2013
摘要:Formal methods are one of the most important technologies to analyze and design authentication protocols. Kerberos protocol is a famous identity authentication protocol and it is widely used in the network. Although some fruitful formal verifications of the Kerberos protocol...
作者:Shenghui Su , Yongquan Cai , Changxiang Shen
来源:[B].Lecture Notes in Computer Science2008
摘要:Abstract Through the combination of digital signature algorithms and in-tegrated circuit chips, the paper puts forwards a new banknote anti-forgery method which may be regarded as an information system. The paper conceives the preliminary design of the system which...
作者:Lei Shi , Shenghui Su , Zhengrong Xiang
来源:[B].Lecture Notes in Computer Science2009
摘要:Abstract The terrorism threat which is conducted by international terrorists who possess forged identities and passports becomes more and more serious and imminent. Traditional methods and techniques of preventing passport from forgery are not effectual enough. This ...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×