Deep search:Searching for "Hash function" in 'KEYWORD Got 5 items.
index Title
1An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
Author(s):Rong FAN, Dao-jing HE, Xue-zeng PA...  Clicked:10377  Download:5296  Cited:17  <Full Text>
Journal of Zhejiang University Science C  2011 Vol.12 No.7 P.550-560  DOI:10.1631/jzus.C1000377
2Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
Author(s):Fan Zhang, Zi-yuan Liang, Bo-lin Y...  Clicked:5612  Download:3597  Cited:0  <Full Text>  <PPT> 1545
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1475-1499  DOI:10.1631/FITEE.1800576
3Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
Author(s):Fei Li, Wei Gao, Gui-lin Wang, Ke-...  Clicked:7948  Download:2801  Cited:0  <Full Text>  <PPT> 1695
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.176-186  DOI:10.1631/FITEE.1700005
4Lane changing assistance strategy based on an improved probabilistic model of dynamic occupancy grids
Author(s):Zhengcai Yang, Zhenhai Gao, Fei Ga...  Clicked:6097  Download:7405  Cited:0  <Full Text>  <PPT> 1138
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.11 P.1492-1504  DOI:10.1631/FITEE.2000439
5Certificateless broadcast multi-signature for network coding
Author(s):Huifang YU, Zhewei QI  Clicked:2187  Download:3930  Cited:0  <Full Text>  <PPT> 528
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.9 P.1369-1377  DOI:10.1631/FITEE.2200271
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE