Search scope:
排序: Display mode:
Certificateless broadcast multi-signature for network coding Research Article
Huifang YU, Zhewei QI
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1369-1377 doi: 10.1631/FITEE.2200271
Keywords: Network coding Certificateless multi-signature Linear combination Homomorphic hash function
Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 2, Pages 168-182 doi: 10.1007/s11705-021-2056-8
Keywords: computer-aided molecular design bio-oil additives molecular signature descriptor
Low-computation certificateless hybrid signcryption scheme Article
Hui-fang YU, Bo YANG
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7, Pages 928-940 doi: 10.1631/FITEE.1601054
Keywords: Hybrid signcryption Scalar multiplication Certificateless cryptosystem Provable security
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Strategic Study of CAE 2000, Volume 2, Issue 2, Pages 41-46
Keywords:
the generating lock
the central encrypting system
multi-tooth encrypting-decrypting algorithm
P
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2, Pages 135-142 doi: 10.1631/FITEE.1500197
Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.
Keywords: Identity Signature Lattice Number theory research unit (NTRU)
Constructing pairing-free certificateless public key encryption with keyword search Research Articles
Yang LU, Ji-guo LI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8, Pages 1049-1060 doi: 10.1631/FITEE.1700534
Keywords: Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing
Aleakage-resilient certificateless public key encryption scheme withCCA2security None
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4, Pages 481-493 doi: 10.1631/FITEE.1601849
Keywords: Certificateless public-key encryption Leakage-resilience Provable security CCA2 security Decisional Diffie-Hellman
Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature
Frontiers of Medicine 2023, Volume 17, Issue 4, Pages 768-780 doi: 10.1007/s11684-023-0982-1
Keywords: machine learning methods hypertrophic cardiomyopathy genetic risk
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2, Pages 141-286 doi: 10.1631/FITEE.1900318
Keywords: Identity-based signature Lattice Strong unforgeability Random oracle model
Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome
Guangbiao Zhou, Xinchun Zhao
Frontiers of Medicine 2018, Volume 12, Issue 2, Pages 236-238 doi: 10.1007/s11684-017-0611-y
Recently, Ng . reported that the A:T>T:A substitutions, proposed to be a signature of aristolochicchloride and its reactive metabolites chloroethylene oxide, melphalan and chlorambucil, also cause this signature
Keywords: genomic signature carcinogen aristolochic acid tobacco smoke vinyl chloride hepatocellular carcinoma
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Strategic Study of CAE 2022, Volume 24, Issue 4, Pages 145-155 doi: 10.15302/J-SSCAE-2022.04.015
Keywords: quantum cryptography protocols quantum key distribution quantum digital signature quantum private
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020
This paper analyzes and sorts out the latest developments and typical applications of network electronic identity management in major countries and regions around the world, and discusses development trends in network identity management technology. It outlines network electronic identity management in China according to the 13th Five-Year Plan, including the development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system. Such a system can help to regulate the behavior of Internet users, fight against network crime, build network power, safeguard national security and cyberspace sovereignty, and protect the privacy of network users; thus, it provides a reference for China’s network identity management development during the 13th Five-Year Plan.
Keywords: network electronic identity identity management digital signature
Multi-objective optimization for the multi-mode finance-based project scheduling problem
Sameh Al-SHIHABI, Mohammad AlDURGAM
Frontiers of Engineering Management 2020, Volume 7, Issue 2, Pages 223-237 doi: 10.1007/s42524-020-0097-1
Keywords: multi-objective optimization finance-based scheduling multi-mode project scheduling mixed-integer linear
Frontiers of Mechanical Engineering 2023, Volume 18, Issue 2, doi: 10.1007/s11465-022-0737-8
Keywords: selective laser melting (SLM) build orientation determination multi-feature mechanical part (MFMP) fuzzy analytical hierarchy process multi-objective decision making (MODM)
A power resource dispatching framework with a privacy protection function in the Power Internet of Things Research Article
Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1354-1368 doi: 10.1631/FITEE.2100518
Keywords: Power Internet of Things Cloud-fog cooperation Elliptic curve Random oracle model Certificateless
Title Author Date Type Operation
Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular
Journal Article
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Journal Article
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Journal Article
Constructing pairing-free certificateless public key encryption with keyword search
Yang LU, Ji-guo LI
Journal Article
Aleakage-resilient certificateless public key encryption scheme withCCA2security
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Journal Article
Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature
Journal Article
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Journal Article
Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome
Guangbiao Zhou, Xinchun Zhao
Journal Article
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Journal Article
Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Journal Article
Multi-objective optimization for the multi-mode finance-based project scheduling problem
Sameh Al-SHIHABI, Mohammad AlDURGAM
Journal Article
Build orientation determination of multi-feature mechanical parts in selective laser melting via multi-objective
Journal Article