期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Comments on A Signcryption 被引量:2
1
作者 YOULin yangyi-xian ZHANGChun-qi 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第3期28-31,共4页
Chen proposes a signature with message recovery which is called anauthenticated encryption scheme or simply a signcryption. In this short note, we show that Chen'ssignature scheme has some mistakes and propose thr... Chen proposes a signature with message recovery which is called anauthenticated encryption scheme or simply a signcryption. In this short note, we show that Chen'ssignature scheme has some mistakes and propose three modified versions. 展开更多
关键词 SIGNATURE SIGNCRYPTION MODIFICATION
原文传递
A Solution of Secure Communication in the Current and Future Mobile Network 被引量:1
2
作者 LIDong yangyi-xian +1 位作者 NIUXin-xin CHOUHsi-tseng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第1期1-4,共4页
To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile ... To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile terminals and the Internet Web Server. Yield to thecapabilities of the current mobile terminals, the public key techniques cannot be used now. But inthe future, the memory space and the computation ability of the mobile terminals will no longer beany puzzles, so certificate and Public Key Infrastructure (PKI) can be used to make wirelesscommunication security. This paper also proposes PKI architecture in the future mobile network.Finally this paper makes an assumption of the network's development and its secure issues. 展开更多
关键词 PKI mobile network secret key public key
原文传递
Hiding Information into Palette-Based Image 被引量:1
3
作者 WUHong-tao ZHUBo-cheng yangyi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第1期5-9,14,共6页
关键词 information hiding palette matrix index image
原文传递
On the Structure of 0/1 Balance Knapsack Module 2~N
4
作者 ZHANGChun-qi yangyi-xian YOULin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第1期34-38,共5页
In this paper, we prove that the 0/1 balance knapsack module 2~N isequivalent to the standard balance knapsack with its weight matrix being the upper triangle matrix,its number equals to 2^(N(N-1)/2)N(! ), and the ith... In this paper, we prove that the 0/1 balance knapsack module 2~N isequivalent to the standard balance knapsack with its weight matrix being the upper triangle matrix,its number equals to 2^(N(N-1)/2)N(! ), and the ith component' s nolinear complexity of the outputsequence being i. 展开更多
关键词 KNAPSACK COMPLEXITY STRUCTURE
原文传递
Combining Digital Watermarks with Two-Color Bitmap Image
5
作者 SAADAAmer yangyi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第1期31-35,共5页
A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the waterm... A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the watermarks in two-color bitmap image by looking for some characteristic values in the bitmap and uses the relationship between the watermarks and the characteristic values to prove the copyright protection. The choice of the characteristic values depends on the choice of a cryptographic key known by the owner of the bitmap. The benefit of using a cryptographic key is to combine the watermarks with the bitmap in a high secure way. 展开更多
关键词 digital watermarks information hiding copyright protection
原文传递
Reparable Key Distribution Protocols for Internet Environments
6
作者 yangyi-xian NIUXin-xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第1期86-88,共3页
关键词 key distribution protocols CRYPTOLOGY network security
原文传递
Single-Term Unlinkable Electronic Cash Based on Bit Commitment
7
作者 ZHONGMing yangyi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第4期77-80,共4页
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部