Search scope:
排序: Display mode:
A lightweight authentication scheme with user untraceability
Kuo-Hui YEH
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 4, Pages 259-271 doi: 10.1631/FITEE.1400232
Keywords: Authentication Privacy Security Smart card Untraceability
Parallel Authentication Modes Based on Double Blocks or Key Counter
Huang Yuhua,Huai Aiqun,Song Yubo
Strategic Study of CAE 2004, Volume 6, Issue 7, Pages 70-74
Keywords: authentication mode CBC - MAC mode PMAC mode CTR mode CCM mode
Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO
Frontiers of Agricultural Science and Engineering 2017, Volume 4, Issue 3, Pages 353-357 doi: 10.15302/J-FASE-2017157
Keywords: Tongren Dahuoluo Wan molecular diagnostic assay Eospalax baileyi Panthera pardus species-specific primers
IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication
Wang Xingjian,Hu Aiqun,Huang Yuhua
Strategic Study of CAE 2006, Volume 8, Issue 9, Pages 69-73
Keywords: IEEE 802.16 mesh node multi-hops mutual authentication self-modified routing
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing Research Article
Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 1, Pages 88-103 doi: 10.1631/FITEE.2200118
Keywords: Image secret sharing Shadow image authentication Public key Pixel expansion Lossless decoding
The Research and Implementation of WAPI Authentication on WLAN Access Point
Song Yubo,Yang Xiaohui,Hu Aiqun,Wang Zhili
Strategic Study of CAE 2005, Volume 7, Issue 9, Pages 65-69
Keywords: WLAN WAPI test analysis
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 176-186 doi: 10.1631/FITEE.1700005
Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICSThe double-authentication-preventing property means that any pair of signatures on two different messages
Keywords: Double-authentication-preventing signatures Chameleon hash function Digital signature Provable security
The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network
Cao Ping,Pei Wenjiang
Strategic Study of CAE 2005, Volume 7, Issue 12, Pages 78-82
Since the LEAP wireless authentication protocol is vulnerable to dictionary attacks, the flexibleauthentication via secure tunneling (EAP - FAST) was introduced by Cisco Corporation in 2004, which establishesa mutually authenticated protected tunnel to protect the authentication data.
Keywords: public wireless local area network port based network access control (802.1x) flexible authentication
The Design on the Security Architecture of Public WLAN Based on Access Controller Mode
Song Yubo, Huai qun, Yang Xiaohui
Strategic Study of CAE 2008, Volume 10, Issue 8, Pages 56-59
Keywords: public WLAN security architecture authentication access controller
Developing Medical Examiner Offices in China: Necessity and Administration Mode
Song Suimin, Ma Chunling, Li Shujin, Cong Bin
Strategic Study of CAE 2020, Volume 22, Issue 4, Pages 154-160 doi: 10.15302/J-SSCAE-2020.04.022
Keywords: the administration of judicial authentication bureau of medical examiner administration mode social governance
Rapid Authentication of the Poisonous Plant Gelsemium elegans by Combining Filter-Paper-Based
Xiasheng Zheng, Wenli An, Hui Yao, Jiang Xu, Shilin Chen
Engineering 2021, Volume 7, Issue 1, Pages 14-16 doi: 10.1016/j.eng.2020.02.012
The provable security formal analysis of 802.11i authentication scheme
Song Yubo,Hu Aiqun,Yao Bingxin
Strategic Study of CAE 2010, Volume 12, Issue 1, Pages 67-73
Keywords: 802.11i Bellare-Rogaway model provable security formal analysis
Correlation power attack on amessage authentication code based on SM3 Research Articles
Ye YUAN, Kai-ge QU, Li-ji WU, Jia-wei MA, Xiang-min ZHANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7, Pages 930-945 doi: 10.1631/FITEE.1800312
Hash-based message authentication code (HMAC) is widely used in authentication and message integrity
Keywords: HMAC-SM3 Side channel analysis Correlation power attack Bit-wise chosen-plaintext
Title Author Date Type Operation
Parallel Authentication Modes Based on Double Blocks or Key Counter
Huang Yuhua,Huai Aiqun,Song Yubo
Journal Article
Molecular authentication of the traditional Chinese medicine Tongren Dahuoluo Wan and its alternative
Jikun WANG, Jing DU, Meng CAO, Lu YAO, Suhua XIE, Jiafu CHEN, Xingbo ZHAO
Journal Article
IEEE 802.16 Mesh Network SA Management Mechanism Based on Multi-hops Mutual Authentication
Wang Xingjian,Hu Aiqun,Huang Yuhua
Journal Article
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
Xuehu YAN, Longlong LI, Jia CHEN, Lei SUN,publictiger@126.com
Journal Article
The Research and Implementation of WAPI Authentication on WLAN Access Point
Song Yubo,Yang Xiaohui,Hu Aiqun,Wang Zhili
Journal Article
Double-authentication-preventing signatures revisited: new definition and construction from chameleon
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Journal Article
The Research and Implementation of EAP - FAST Protocol in Public Wireless Local Area Network
Cao Ping,Pei Wenjiang
Journal Article
The Design on the Security Architecture of Public WLAN Based on Access Controller Mode
Song Yubo, Huai qun, Yang Xiaohui
Journal Article
Developing Medical Examiner Offices in China: Necessity and Administration Mode
Song Suimin, Ma Chunling, Li Shujin, Cong Bin
Journal Article
Rapid Authentication of the Poisonous Plant Gelsemium elegans by Combining Filter-Paper-Based
Xiasheng Zheng, Wenli An, Hui Yao, Jiang Xu, Shilin Chen
Journal Article
The provable security formal analysis of 802.11i authentication scheme
Song Yubo,Hu Aiqun,Yao Bingxin
Journal Article