-
1
المؤلفون: Zhangqing He, Lein Harn, Ching-Fang Hsu, Zhe Xia
المصدر: IEEE Sensors Letters. 5:1-4
مصطلحات موضوعية: business.industry, Computer science, Node (networking), 020208 electrical & electronic engineering, 010401 analytical chemistry, Advanced Encryption Standard, Homomorphic encryption, 02 engineering and technology, Encryption, 01 natural sciences, 0104 chemical sciences, Public-key cryptography, Data aggregator, 0202 electrical engineering, electronic engineering, information engineering, Electrical and Electronic Engineering, business, Instrumentation, Wireless sensor network, Computer network, Block (data storage)
-
2
المؤلفون: Ching-Fang Hsu, Zhe Xia, Lein Harn
المصدر: IET Communications. 14:2162-2165
مصطلحات موضوعية: Theoretical computer science, business.industry, Computer science, Key distribution, 020302 automobile design & engineering, 020206 networking & telecommunications, Cryptography, 02 engineering and technology, Quantum key distribution, Cryptographic protocol, Computer Science Applications, Public-key cryptography, 0203 mechanical engineering, Secure communication, Quantum cryptography, 0202 electrical engineering, electronic engineering, information engineering, Session key, Key derivation function, Electrical and Electronic Engineering, business, BB84, Quantum, Group key
-
3
المؤلفون: Changlu Lin, Lein Harn
المصدر: Computers & Electrical Engineering. 40:1972-1980
مصطلحات موضوعية: Key-agreement protocol, Authentication, Public key certificate, Theoretical computer science, General Computer Science, business.industry, Computer security, computer.software_genre, Secret sharing, Diffie–Hellman key exchange, Public-key cryptography, Control and Systems Engineering, Key (cryptography), Electrical and Electronic Engineering, business, computer, Mathematics, Group key
-
4
المؤلفون: Lein Harn
المصدر: IEEE Transactions on Computers. 62:1893-1898
مصطلحات موضوعية: Challenge-Handshake Authentication Protocol, Authentication, business.industry, Computer science, Data_MISCELLANEOUS, Email authentication, Cryptography, Computer security, computer.software_genre, Secret sharing, Theoretical Computer Science, Public-key cryptography, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Computational Theory and Mathematics, Digital signature, Hardware and Architecture, Generic Bootstrapping Architecture, Authentication protocol, Lightweight Extensible Authentication Protocol, Challenge–response authentication, business, computer, Software, Data Authentication Algorithm, Computer network
-
5
المصدر: IEEE Transactions on Wireless Communications. 10:2372-2379
مصطلحات موضوعية: Key establishment, Public key certificate, Computer science, Security token, Self-signed certificate, Computer security, computer.software_genre, law.invention, Public-key cryptography, Certificate signing request, Digital signature, law, Certificate authority, Electrical and Electronic Engineering, Key management, Authentication, business.industry, Certificate policy, Applied Mathematics, Public key infrastructure, Cryptographic protocol, Computer Science Applications, Authorization certificate, Root certificate, Discrete logarithm, business, Cryptanalysis, computer, Implicit certificate, Computer network
-
6
المؤلفون: Lein Harn, Jian Ren, Changlu Lin
المصدر: Journal of Systems and Software. 82:789-793
مصطلحات موضوعية: Provable security, Public key certificate, Merkle signature scheme, Computer science, business.industry, ElGamal signature scheme, Computer security, computer.software_genre, Random oracle, Public-key cryptography, Ring signature, Digital signature, Hardware and Architecture, Discrete logarithm, Blind signature, Cryptosystem, business, Threshold cryptosystem, computer, Software, Key escrow, Schnorr signature, Information Systems, Computer network
-
7
المصدر: International Journal of Interdisciplinary Telecommunications and Networking. 1:1-15
مصطلحات موضوعية: business.industry, Computer science, Node (networking), Self-organizing network, General Medicine, Peer-to-peer, Service provider, computer.software_genre, Computer security, Public-key cryptography, Web of trust, Trust management (information system), Computational trust, business, computer, Computer network
-
8
المؤلفون: Lein Harn, Changlu Lin, Jian Ren
المصدر: International Journal of Information Security. 8:205-210
مصطلحات موضوعية: Authentication, Theoretical computer science, Computer Networks and Communications, Computer science, business.industry, Cryptography, Computer security, computer.software_genre, Signature (logic), Random oracle, Multisignature, Public-key cryptography, Digital signature, Data integrity, Safety, Risk, Reliability and Quality, business, computer, Software, Information Systems
-
9
المصدر: Computers & Security. 27:12-15
مصطلحات موضوعية: Scheme (programming language), General Computer Science, Merkle signature scheme, business.industry, Computer science, Signature (logic), Multisignature, Public-key cryptography, Digital signature, Blind signature, Identity (object-oriented programming), business, Law, computer, computer.programming_language, Computer network
-
10
المؤلفون: Guang Gong, Lein Harn
المصدر: IEEE Transactions on Information Theory. 45:2601-2605
مصطلحات موضوعية: Theoretical computer science, business.industry, Cryptography, Library and Information Sciences, Encryption, Computer Science Applications, Public-key cryptography, Finite field, Key (cryptography), XTR, Key encapsulation, business, Information Systems, Key size, Mathematics