期刊文献+
共找到355篇文章
< 1 2 18 >
每页显示 20 50 100
A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol 被引量:2
1
作者 谭作文 《China Communications》 SCIE CSCD 2011年第2期26-33,共8页
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is propo... An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is proposed. Its authentication part is proven secure against existential forgery on adaptively chosen message and ID attacks under the random oracle model upon the CDH assumptions. The session keys are proven secure in a formal CK security model under the random oracle model upon the CBDH assumptions. Compared with the previous multiple key agreement protocols,it requires less communication cost. 展开更多
关键词 AUTHENTICATION identity-based KEY AGREEMENT
在线阅读 下载PDF
Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks 被引量:1
2
作者 陈曦 田有亮 +1 位作者 李兴华 马建峰 《China Communications》 SCIE CSCD 2011年第4期132-140,共9页
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-... In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks. 展开更多
关键词 opportunistic networks social context-based routing identity-based signature threshold cryptography
在线阅读 下载PDF
Sharing of Encrypted Lock Keys in the Blockchain-Based Renting House System from Time- and Identity-Based Proxy Reencryption 被引量:1
3
作者 Zhiwei Wang Liping Qian +1 位作者 Danwei Chen Guozi sun 《China Communications》 SCIE CSCD 2022年第5期164-177,共14页
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secu... To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secure TIPRE scheme is constructed from Green et al.’s identity-based proxy reencryption scheme by adding the time property.In every time period,a time stamp authority generates a public key embedded with the current time stamp for each user.In our protocol for the renting house system,the TIPRE scheme is the primary building block,and the blockchain platform serves instead of a trusted third party,such as a real estate agency between landlords and tenants.The TIPRE scheme allows the landlord to change the lock key at each time period for safety.The blockchain platform allows the landlords and tenants to directly interact,and all of the interactions are recorded in the blockchain database to provide the desired security requirements,such as nonrepudiation and unforgeability.Finally,we provide the secure analysis of our protocol and test its performance by implementing it in the MacBook Pro and the Intel Edison development platforms. 展开更多
关键词 identity-based proxy reencryption time stamp renting houses system blockchain
在线阅读 下载PDF
Fully Secure Identity-based Broadcast Encryption in the Subgroups 被引量:1
4
作者 张乐友 胡予濮 吴青 《China Communications》 SCIE CSCD 2011年第2期152-158,共7页
In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive se... In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive security) under three static(i.e. non q-based) assumptions. It is worth noting that only recently Waters gives a short ciphertext broadcast encryption system that is even adaptively secure under the simple assumptions. One feature of our methodology is that it is relatively simple to leverage our techniques to get adaptive security. 展开更多
关键词 identity-based broadcast encryption dual system encryption full security static assumption SUBGROUP provable security
在线阅读 下载PDF
An Efficient Method of Generating Parameters for Pairing-Based Cryptosystems
5
作者 WANG Maocai DAI Guangming PEN Lei ZHEN Chang QIN Ruijie 《China Communications》 SCIE CSCD 2010年第4期167-171,共5页
Efficient computation of Tate pairing is a crucial factor for practical applications of pairing-based cryptosystems(PBC).Recently,there have been many improvements for the computation of Tate pairing,which focuses on ... Efficient computation of Tate pairing is a crucial factor for practical applications of pairing-based cryptosystems(PBC).Recently,there have been many improvements for the computation of Tate pairing,which focuses on the arithmetical operations above the finite field.In this paper,we analyze the structure of Miller’s algorithm firstly,which is used to implement Tate pairing.Based on the characteristics that Miller’s algorithm will be improved tremendous if the order of the subgroup of elliptic curve group is low hamming prime,a new method for generating parameters for PBC is put forward,which enable it feasible that there is certain some subgroup of low hamming prime order in the elliptic curve group generated.Finally,we analyze the computation efficiency of Tate pairing using the new parameters for PBC and give the test result.It is clear that the computation of Tate pairing above the elliptic curve group generating by our method can be improved tremendously. 展开更多
关键词 Pairing-based cryptosystems Miller's Algorithm Tate Pairing Low Hamming Elliptic Curve
在线阅读 下载PDF
Deep-learning-based cryptanalysis of two types of nonlinear optical cryptosystems
6
作者 Xiao-Gang Wang Hao-Yu Wei 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第9期293-300,共8页
The two types of nonlinear optical cryptosystems(NOCs)that are respectively based on amplitude-phase retrieval algorithm(APRA)and phase retrieval algorithm(PRA)have attracted a lot of attention due to their unique mec... The two types of nonlinear optical cryptosystems(NOCs)that are respectively based on amplitude-phase retrieval algorithm(APRA)and phase retrieval algorithm(PRA)have attracted a lot of attention due to their unique mechanism of encryption process and remarkable ability to resist common attacks.In this paper,the securities of the two types of NOCs are evaluated by using a deep-learning(DL)method,where an end-to-end densely connected convolutional network(DenseNet)model for cryptanalysis is developed.The proposed DL-based method is able to retrieve unknown plaintexts from the given ciphertexts by using the trained DenseNet model without prior knowledge of any public or private key.The results of numerical experiments with the DenseNet model clearly demonstrate the validity and good performance of the proposed the DL-based attack on NOCs. 展开更多
关键词 optical encryption nonlinear optical cryptosystem deep learning phase retrieval algorithm
在线阅读 下载PDF
Review on Identity-Based Batch Verification Schemes for Security and Privacy in VANETs
7
作者 Eko Fajar Cahyadi Cahya Damarjati Min-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS CSCD 2022年第1期92-110,共19页
The study of vehicular ad-hoc networks(VANETs)has received significant attention among academia;even so,its security and privacy still become a central issue that is wide-open to discuss.The authentication schemes dep... The study of vehicular ad-hoc networks(VANETs)has received significant attention among academia;even so,its security and privacy still become a central issue that is wide-open to discuss.The authentication schemes deployed in VANETs have a substantial impact on its security and privacy.Many researchers have proposed a variety of schemes related to the information verification and efficiency improvement in VANETs.In recent years,many papers have proposed identity-based batch verification(IBV)schemes in regard to diminishing overhead in the message verification process in VANETs.This survey begins with providing background information about VANETs and clarifying its security and privacy,as well as performance requirements that must be satisfied.After presenting an outlook of some relevant surveys of VANETs,a brief review of some IBV schemes published in recent years is conferred.The detailed approach of each scheme,with a comprehensive comparison between them,has been provided afterward.Finally,we summarize those recent studies and possible future improvements. 展开更多
关键词 Efficiency identity-based batch verification(IBV) security and privacy SURVEY vehicular ad-hoc networks(VANETs)
在线阅读 下载PDF
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
8
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ECC) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
在线阅读 下载PDF
针对物联网设备的旁路攻击及防御方法的研究
9
作者 何乐生 冯毅 +2 位作者 岳远康 杨崇宇 胡崇辉 《通信学报》 北大核心 2025年第2期166-175,共10页
物联网设备通常使用计算能力受限的微控制器来实现,因而只能采用轻量级对称加密算法来保证其数据安全,且其自身的特点决定了只能被部署在开放环境中,极易遭受旁路攻击。针对这一问题,在基于自主设计的旁路攻击验证平台上开展实验,并提... 物联网设备通常使用计算能力受限的微控制器来实现,因而只能采用轻量级对称加密算法来保证其数据安全,且其自身的特点决定了只能被部署在开放环境中,极易遭受旁路攻击。针对这一问题,在基于自主设计的旁路攻击验证平台上开展实验,并提出了安全密钥管理方案及改进的S盒设计,作为旁路攻击防御方法。验证平台由两级差分放大器和抗干扰有限冲激响应(FIR)滤波器构成,能够捕捉微弱的功耗变化,并设计了针对轻量级加密算法的两轮相关能量攻击。通过获取正确密钥相关系数置信度的评估方法,在对PRESENT算法的3 000条功耗曲线进行10 000次攻击后,成功率超过96%,正确密钥的相关性均值均超过0.6,在95%的置信水平下,拥有狭窄的置信区间,而采用改进后的算法进行相同实验时,攻击成功率仅为9.12%。 展开更多
关键词 物联网安全 轻量级密码 旁路攻击 相关能量分析
在线阅读 下载PDF
A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network 被引量:1
10
作者 王兴元 鲍雪梅 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期232-240,共9页
In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (... In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hard- ware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosys- tem is secure and practical, and suitable for image encryption. 展开更多
关键词 image encryption block cryptosystem chaotic neural network coupled map lattice
在线阅读 下载PDF
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
11
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 Elliptic curve cryptosystem Group signature Threshold scheme Dynamic threshold group signature
在线阅读 下载PDF
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem 被引量:2
12
作者 Zeyu Liu Tiecheng Xia Jinbo Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第3期161-176,共16页
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif... We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms. 展开更多
关键词 CHAOS fractional two-dimensional triangle function combination discrete chaotic map image encryption Menezes-Vanstone elliptic curve cryptosystem
在线阅读 下载PDF
Phase-Shifting-Free Interferometric Cryptosystem
13
作者 李拓 史祎诗 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第3期34-37,共4页
Conventional phase-shifting interferometry-based (PSI-based) cryptosystem needs at least two-step phase-shifting. In this work, we propose a phase-shifting-free interferometric cryptosystem, which needs only one int... Conventional phase-shifting interferometry-based (PSI-based) cryptosystem needs at least two-step phase-shifting. In this work, we propose a phase-shifting-free interferometric cryptosystem, which needs only one interferogram recording. Since the phase-shifting step is not required in the proposed cryptosystem, not only the low encryption speed which is a bottleneck problem of the conventional PSI-based one is solved, but also the setup of the cryptosystem is simplified. A series of simulation experimental results demonstrate the validity and robustness of the proposed cryptosystem. 展开更多
关键词 Phase-Shifting-Free Interferometric cryptosystem PSI MSE CCD FIGURE PZT
在线阅读 下载PDF
PRIDE轻量级密码的不可能统计故障分析
14
作者 李玮 孙文倩 +2 位作者 谷大武 张爱琳 温云华 《通信学报》 EI CSCD 北大核心 2024年第1期141-151,共11页
针对2014年美密会上提出的PRIDE轻量级密码的实现安全,提出了面向唯密文攻击假设的新型不可能统计故障分析方法,设计了卡方拟合优度-汉明重量区分器、卡方拟合优度-极大似然估计区分器等新型区分器。所提方法基于随机半字节故障模型,结... 针对2014年美密会上提出的PRIDE轻量级密码的实现安全,提出了面向唯密文攻击假设的新型不可能统计故障分析方法,设计了卡方拟合优度-汉明重量区分器、卡方拟合优度-极大似然估计区分器等新型区分器。所提方法基于随机半字节故障模型,结合统计分布状态和不可能关系分析,围绕导入故障前后中间状态的变化,最少仅需432个故障即可恢复出PRIDE算法的128 bit原始密钥,且成功率达99%及以上。实验分析表明,所提方法不仅能减少故障数和耗时,而且进一步提升了准确率。该结果对轻量级密码的实现安全性提供了重要参考。 展开更多
关键词 侧信道分析 不可能统计故障分析 轻量级密码 PRIDE 智能无人系统
在线阅读 下载PDF
对称密码体制的量子攻击
15
作者 冯晓宁 吴洪宇 《应用科学学报》 CAS CSCD 北大核心 2024年第1期39-52,共14页
该文梳理了近年来量子攻击在对称密码体制的研究脉络,分析了主流攻击方法的研究趋势与各文献之间的关系,并将主流攻击方法分为量子周期攻击、Grover算法相关攻击、量子差分攻击3类,分别介绍了具有代表性的攻击方法,呈现了各攻击方法的... 该文梳理了近年来量子攻击在对称密码体制的研究脉络,分析了主流攻击方法的研究趋势与各文献之间的关系,并将主流攻击方法分为量子周期攻击、Grover算法相关攻击、量子差分攻击3类,分别介绍了具有代表性的攻击方法,呈现了各攻击方法的核心思想。立足于现有的攻击方案,展望了这一领域可能会出现的热门研究方向。 展开更多
关键词 密码分析 量子算法 对称密码体制 量子攻击
在线阅读 下载PDF
可证安全的ISRSAC密码体制的设计与分析 被引量:2
16
作者 袁煜淇 隋吉达 +1 位作者 张艳硕 秦晓宏 《北京电子科技学院学报》 2024年第2期34-42,共9页
本文讨论了可证安全的ISRSAC密码体制的设计与分析。在对ISRSAC算法的流程和ISRSAC的正确性和安全性进行研究和分析的基础上,对ISRSAC方案的缺陷做出改进,并设计了ISRSAC-OAEP和ISRSAC-PSS两种可证明安全的密码算法方案。文章结尾分析了... 本文讨论了可证安全的ISRSAC密码体制的设计与分析。在对ISRSAC算法的流程和ISRSAC的正确性和安全性进行研究和分析的基础上,对ISRSAC方案的缺陷做出改进,并设计了ISRSAC-OAEP和ISRSAC-PSS两种可证明安全的密码算法方案。文章结尾分析了ISRSAC-OAEP和ISRSAC-PSS方案的优势,并进行总结得出,在随机预言机模型中,ISRSAC-OAEP和ISRSAC-PSS被证明在抵御适应性选择密文攻击的情况下是安全的。 展开更多
关键词 ISRSAC 可证明安全性理论 密码体制 适应性选择密文攻击
在线阅读 下载PDF
糅合多种因素的双向身份认证密钥协商协议 被引量:1
17
作者 黄朝阳 陈少英 《蚌埠学院学报》 2024年第5期56-66,共11页
为了提高身份认证协议的安全性能,提出一种糅合多种安全因素的双向身份认证密钥协商协议,该协议引入高熵随机数,糅合智能卡、生物特征认证和公钥密码体制等多种安全因素。通信双方通过挑战/应答机制的三次握手来实现双向认证,并协商生... 为了提高身份认证协议的安全性能,提出一种糅合多种安全因素的双向身份认证密钥协商协议,该协议引入高熵随机数,糅合智能卡、生物特征认证和公钥密码体制等多种安全因素。通信双方通过挑战/应答机制的三次握手来实现双向认证,并协商生成后续会话所需密钥。通过BAN逻辑分析和多种已知攻击的非形式化安全分析证明,本协议有较高的安全性能。本协议实现双向认证所需通信带宽为1360 bits,通信总轮数为3次,期间仅需一次非对称加密、一次非对称解密和12次Hash运算。与其它相关协议相比,该协议有效降低了运算复杂度,展现出更高的效率。 展开更多
关键词 身份认证 密钥协商 公钥密码体制 生物特征 智能卡
在线阅读 下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
18
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
在线阅读 下载PDF
基于汉明重量的序列密码体制识别方案
19
作者 史国振 李楚涵 +2 位作者 谢绒娜 谭莉 胡云深 《信息安全研究》 CSCD 北大核心 2024年第12期1172-1178,共7页
密码体制识别是基于密文已知的情况下,通过分析密文数据中潜在的特征信息完成密码算法识别的过程.提出了一种基于汉明重量的序列密码体制识别方案.该方案通过计算不同长度密文块的汉明重量,生成带有标签的密文特征向量;运用LDA(linear d... 密码体制识别是基于密文已知的情况下,通过分析密文数据中潜在的特征信息完成密码算法识别的过程.提出了一种基于汉明重量的序列密码体制识别方案.该方案通过计算不同长度密文块的汉明重量,生成带有标签的密文特征向量;运用LDA(linear discriminant analysis)降维技术对特征向量进行降维,从而优化数据信息的提取与利用效率;最后利用全连接神经网络对降维后的特征向量进行识别.实验结果表明,该方案能够有效地对ZUC,Salsa20,Decimv2等8种序列密码算法进行二分类识别实验和八分类识别实验,取得较好的识别效果.二分类识别实验的平均识别率为99.29%,八分类识别实验的平均识别率为79.12%.与现有研究相比,该方案在较少的密文数据量下,相较于现有文献准确率提升了16.29%. 展开更多
关键词 密码体制识别 序列密码算法 LDA降维算法 全连接神经网络 算法识别
在线阅读 下载PDF
空间信息网络公钥管理方案的设计与分析
20
作者 杨静春 陈韬鸣 +2 位作者 蒋鑫 徐松艳 张道法 《遥测遥控》 2024年第5期50-57,共8页
为保障空间信息网络认证与密钥分发的安全性,本文提出了一种基于椭圆曲线密码系统的公钥管理方案,提供入网认证、密钥协商和密钥更新等功能,实现了认证性、抗重放和前向/后向安全性等多种安全目标。对于卫星间的认证和密钥协商,本方案... 为保障空间信息网络认证与密钥分发的安全性,本文提出了一种基于椭圆曲线密码系统的公钥管理方案,提供入网认证、密钥协商和密钥更新等功能,实现了认证性、抗重放和前向/后向安全性等多种安全目标。对于卫星间的认证和密钥协商,本方案仅需卫星之间进行3次交互即可完成。通过对方案进行安全性和效率分析,证实了本方案在空间信息网络中的实际可用性以及同现有公钥管理方案相比效率上的优越性。 展开更多
关键词 空间信息网络 公钥管理 认证和密钥协商 椭圆曲线密码系统
在线阅读 下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部