登录    注册    忘记密码
-

检索结果分析

署名顺序

结果分析中...

成果/Result

已选条件:
  • 收录类型=EIx
  • 人物=陈莉x

19 条 记 录,以下是 1-19

视图:
排序方式:
共1页<< <1> >>每页显示条目数:
NTRU格上高效的基于身份的全同态加密体制被引量:5收藏 分享
作者:段然 顾纯祥 祝跃飞 郑永辉 陈莉
机构:信息工程大学四院;数学工程与先进计算国家重点实验室;河南财经政法大学网络信息安全研究所
来源:《通信学报》  2017
关键词:全同态加密  基于身份加密  NTRU格  随机谕示模型  近似特征向量  
摘要:全同态加密是目前解决云计算网络数据隐私保护问题的最佳方案,但目前的体制的公钥尺寸普遍较大。首先,通过引入Kullback-LEIbler散度的概念,构造一种NTRU格上的基于身份公钥的加密体制,参数分析表明体制具有较小的...
A hazardous boundary of Poly(L-lactic acid) braided stent design: Limited elastic deformability of polymer materials被引量:3收藏 分享
作者:Li, Junjie Cheng, Jie Hu, Xue Liu, Jiaming Tian, Yuan
机构:Southeast Univ;Suzhou Inst Nanotech & Nanob;Nanjing Forestry Univ;Henan Univ Econ & Law;Southeast Univ
来源:JOURNAL OF THE MECHANICAL BEHAVIOR OF BIOMEDICAL MATERIALS  2023
关键词:Poly(L-lactic acid)   Braided stent   Mechanical performance   Simulations   Design parameters  
Security analysis and improvement of Yahalom protocol被引量:2收藏 分享
作者:Chen, Li Shi, Mingxia
机构:Henan Univ Finance & Econ;Informat Engn Univ;Henan Light Ind Training Coll
来源:ICIEA 2008: 3RD IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, PROCEEDINGS, VOLS 1-3  2008
关键词:Authentication - Computer circuits - Formal methods - Industrial electronics  
一种NTRU格上基于身份全同态加密体制设计被引量:1收藏 分享
作者:段然 顾纯祥 祝跃飞 郑永辉 陈莉
机构:信息工程大学四院;数学工程与先进计算国家重点实验室;河南财经政法大学网络信息安全研究所
来源:《电子学报》  2018
关键词:全同态加密  基于身份加密  环上带错学习问题  NTRU格  近似特征向量  
摘要:全同态加密可以用来解决云计算环境中的隐私保护问题,然而现有体制具有系统参数大、效率低的缺点.针对现有攻击技术,首先设计了一种高效的NTRU格上的基于身份公钥加密体制,无需借助额外的安全性假设,具有更高的安全性和更小的系统...
Authentication and micropayment protocols based on self-updating hash chains被引量:1收藏 分享
作者:Chen, Li Zhang, Haojun Liu, Nan
机构:Henan Univ Finance & Econ;Informat Engn Univ;Henan Univ Technol
来源:SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS  2007
关键词:Chains - Efficiency - Intelligent systems  
An Efficient Authentication Protocol of WLAN and its Security Proof被引量:0收藏 分享
作者:Zhang, Haojun Chen, Li
机构:Henan Univ Technol;Henan Univ Finance & Econ
来源:2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3  2008
关键词:WLAN   Authentication   WAPI   802.11i   PCL  
Improved Otway Rees Protocol and Its Formal Verification被引量:0收藏 分享
作者:Chen, Li
机构:Henan Univ Finance & Econ
来源:2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM  2008
关键词:Authentication  
An Improved NSSK Protocol and Its Security Analysis based on Logic Approach被引量:0收藏 分享
作者:Chen, Li Wang, Weixian
机构:Henan Univ Finance & Econ
来源:2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM  2008
关键词:Authentication - Computer circuits - Network security  
Efficient identity authentication protocol and its formal analysis被引量:0收藏 分享
作者:Chen, Li Zhang, Guixiang Li, Xiangdong
机构:Henan Univ Finance & Econ;Informat Engn Univ
来源:CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS  2007
关键词:Artificial intelligence - Authentication - Computation theory - Computer circuits - Mobile telecommunication systems  
Optimistic fair contract signing protocol based on hybrid verifiably encrypted signature scheme被引量:0收藏 分享
作者:Chen, Li Gu, Chunxiang
机构: Henan University of Economics and Law; Network Engineering Department
来源:Advances in Information Sciences and Service Sciences  2012
关键词:Network security - Public key cryptography  
Authentication and key establishment scheme based on token for mobile commerce被引量:0收藏 分享
作者:Chen, Li Liu, Jun Wang, Huibin
机构:Henan Univ Finance & Econ;Informat Engn Univ
来源:PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE  2007
关键词:Authentication - Data privacy - Denial-of-service attack - Mobile telecommunication systems  
An E-cash Payment Protocol Realizing Accountability and Fairness被引量:0收藏 分享
作者:Li, Huaiqiang Chen, Li
机构:Henan Univ Finance & Econ
来源:2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM)  2010
关键词:accountability   fairness   anonymity   formal analysis   robustness  
Verification method of security protocols and its application被引量:0收藏 分享
作者:Chen, Li Li, Xiaoxue
机构: Henan University of Economics and Law
来源:Proceedings - 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010  2010
关键词:Computation theory - Cryptography - Formal methods - Intelligent computing - Network security - Semantics  
ID-based signatures from lattices in the random oracle model被引量:0收藏 分享
作者:Gu, Chunxiang Chen, Li Zheng, Yonghui
机构: Zhengzhou Information Science and Technology Institute; Henan University of Economics and Law
来源:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)  2012
关键词:Authentication - Cryptography - Crystal lattices - Hardness - Information systems - Information use - Network security - Quantum theory  
Modified Theoretical Model Predicts Radial Support Capacity of Polymer Braided Stents被引量:0收藏 分享
作者:Hu, Xue Liu, Qingwei Chen, Li Cheng, Jie Liu, Muqing
机构:Southeast Univ;Henan Univ Econ & Law;Nanjing Forestry Univ;Nanjing Univ;Southeast Univ
来源:COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE  2024
关键词:Polymer braided stent   Radial supporting capacity   Modified theoretical model   Friction   Torsion  
基于联合树的隐私高维数据发布方法被引量:0收藏 分享
作者:张啸剑 陈莉 金凯忠 孟小峰
机构:河南财经政法大学计算机与信息工程学院;河南财经政法大学网络信息安全研究所;中国人民大学信息学院
来源:《计算机研究与发展》  2018
关键词:高维数据  差分隐私  Markov网  联合树  边缘分布  
摘要:基于差分隐私的数据发布已得到研究者的广泛关注.然而,现有的发布方法却不能有效地处理高维数据,其原因在于维度灾难和值域多样会引入极大的噪音值,进而使得发布结果的可用性比较低.基于此,提出一种基于联合树的隐私高维数据发布方法...
Interval-valued T-spherical fuzzy extended power aggregation operators and thEIr application in multi-criteria decision-making被引量:0收藏 分享
作者:Chen, Lu
机构:Henan Univ Econ & Law
来源:JOURNAL OF INTELLIGENT SYSTEMS  2024
关键词:interval-value T-spherical fuzzy set   extended power aggregation operator   multi-criteria decision making   cross-entropy  
Cryptographic protocol logic for analyzing a variety of security properties and its formal semantics被引量:0收藏 分享
作者:Chen, Li Li, Xiangdong
机构: Henan University of Economics and Law; School of Computer Science
来源:International Journal of Advancements in Computing Technology  2012
关键词:Cryptography - Formal methods - Network security - Semantics  
Identity-based signature scheme from lattices and its application被引量:0收藏 分享
作者:Chen, Li Gu, Chunxiang
机构: Center of Modern Educational Technology; Network Engineering Department
来源:ICIC Express Letters  2013
关键词:Integer programming - Network security  
已选条目 检索报告 聚类工具

版权所有©河南财经政法大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心