Search scope:
排序: Display mode:
Development and Application of Network Electronic Identity Management in Major Countries and Regions
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020
Keywords: network electronic identity identity management digital signature
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 23-27 doi: 10.15302/J-SSCAE-2016.06.005
Keywords: network electronic identity identity management policies and regulations
Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1, Pages 95-108 doi: 10.15302/J-FASE-2022478
● Consumer preference for environmentally-friendly beverage packaging was investigated.
Keywords: China consumer preference food and beverage packaging green identity label information treatment
The effects of festivals and special events on city image design
LIU Yuan, CHEN Chong
Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2, Pages 255-259 doi: 10.1007/s11709-007-0032-0
Keywords: Visual Identity reversal transmission marketing Behavior Identity
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2, Pages 135-142 doi: 10.1631/FITEE.1500197
Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteRecently,many efforts have been made to construct identity-based signatures over lattice assumptionsIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.
Keywords: Identity Signature Lattice Number theory research unit (NTRU)
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo
Frontiers of Medicine 2012, Volume 6, Issue 1, Pages 79-84 doi: 10.1007/s11684-012-0179-5
Keywords: health insurance urban employee basic health insurance scheme urban-resident scheme new rural cooperative medical system
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2, Pages 141-286 doi: 10.1631/FITEE.1900318
Keywords: Identity-based signature Lattice Strong unforgeability Random oracle model
A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation
ZHOU Bing, CUI Guixiang, CHEN Naixiang
Frontiers in Energy 2007, Volume 1, Issue 4, Pages 468-472 doi: 10.1007/s11708-007-0069-z
Keywords: large-eddy simulation Germano identity coefficient subgrid-scale
The Routine and Emergency Coordinated Management of Public Security
Ning Liu
Frontiers of Engineering Management 2015, Volume 2, Issue 4, Pages 331-338 doi: 10.15302/J-FEM-2015063
Keywords: public security routine management emergency management coordinated management
Cryptanalysis of an identity-based public auditing protocol for cloud storage Comment
Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12, Pages 1972-1977 doi: 10.1631/FITEE.1601530
Keywords: Cloud data Public auditing Data integrity Data privacy
Inheritance and Innovation of Engineering Management Informatization
Kai Sun,Ren-huai Liu
Frontiers of Engineering Management 2014, Volume 1, Issue 1, Pages 76-82 doi: 10.15302/J-FEM-2014014
Keywords: engineering management informatization inter-organizational relationship management creation resource
Energy storage resources management: Planning, operation, and business model
Frontiers of Engineering Management Pages 373-391 doi: 10.1007/s42524-022-0194-4
Keywords: energy storage system energy storage resources management planning configuration operational management
Discussion on Problem-Based Engineering Management System
Qiao Xiang
Frontiers of Engineering Management 2015, Volume 2, Issue 3, Pages 249-260 doi: 10.15302/J-FEM-2015054
Keywords: problem engineering management system
Jian-ya Jiang,Yang-wei Rao
Frontiers of Engineering Management 2014, Volume 1, Issue 4, Pages 406-409 doi: 10.15302/J-FEM-2014049
Keywords: engineering management system education mode comparative research training improvement
Title Author Date Type Operation
Development and Application of Network Electronic Identity Management in Major Countries and Regions
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Journal Article
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang,Hu Chuanping and Fang Binxing、Chen Bing
Journal Article
CONSUMER PREFERENCE FOR ENVIRONMENTALLY-FRIENDLY BEVERAGE PACKAGING: THE ROLE OF INFORMATION PROVISION AND IDENTITY
Journal Article
The effects of festivals and special events on city image design
LIU Yuan, CHEN Chong
Journal Article
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Journal Article
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article
Integration of current identity-based district-varied health insurance schemes in China: implications
Hai-Qiang Wang, Zhi-Heng Liu, Yong-Zhao Zhang, Zhuo-Jing Luo
Journal Article
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Journal Article
A dynamic procedure based on the scale-similarity hypotheses for large-eddy simulation
ZHOU Bing, CUI Guixiang, CHEN Naixiang
Journal Article
Cryptanalysis of an identity-based public auditing protocol for cloud storage
Li-bing WU, Jing WANG, De-biao HE, Muhammad-Khurram KHAN
Journal Article
Inheritance and Innovation of Engineering Management Informatization
Kai Sun,Ren-huai Liu
Journal Article