10 Hits in 4.1 sec

A Survey on Privacy Frameworks for RFID Authentication

Chunhua SU, Yingjiu LI, Yunlei ZHAO, Robert H. DENG, Yiming ZHAO, Jianying ZHOU
2012 IEICE transactions on information and systems  
In Asiacrypt 2007, Vaudernay proposed a new framework and classified the privacy models into eight categories [23] , this framework aims at abstracting most previous works of RFID authentication.  ...  Universal composability (UC) based frameworks for Copyright c 2012 The Institute of Electronics, Information and Communication Engineers RFID privacy are considered in [4] , [5] , [13] , [20] .  ...  Chunhua Su received the B.S. degree for Beijing Electronic Science and Technology Institute in 2003 and recieved his M.S. and PhD of computer science from Faculty of Engineering, Kyushu University in 2006  ... 
doi:10.1587/transinf.e95.d.2 fatcat:2xaza2xudzcenjkptqqtsmph5i

Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications [chapter]

Peng Wang, Yuling Li, Liting Zhang, Kaiyan Zheng
2016 Lecture Notes in Computer Science  
Advances in Cryptology - ASIACRYPT 2012. Lecture Notes in Computer Science, vol. 7658, pp. 580–597. Springer (2012), 10.1007/978-3-642-34961-4_35 2 42.  ...  Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceed- ings. Lecture Notes in Computer Science, vol. 3822, pp. 175–188.  ... 
doi:10.1007/978-3-662-52993-5_26 fatcat:z4gshlyjyzfohbj2cg5t3njiua

Efficient Lattice-Based Cryptosystems with Key Dependent Message Security

Bo Yang, Ruwei Huang, Jianan Zhao
2021 Applied Sciences  
-C., Ed.; Tsinghua University Press: Beijing, China, 2010; pp. 230–240. 21. Lyubashevsky, V.; Micciancio, D.  ...  Eprint Arch. 2012, 2012, 144.  ... 
doi:10.3390/app112412161 fatcat:uijmkhvcc5amvmiyf5knsqrhhu

The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [chapter]

2015 Network Security and Communication Engineering  
Wang Beijing Vacuum Electronics Research Institute, Beijing, China ABSTRACT: The main structure parameters of TWT SWS (slow wave structure) are important.  ...  Kou NASA Center for Aerospace Device Research and Education, North Carolina Central University, Beijing Vacuum Electronics Research Institute, Beijing, China Y. Tang & B.  ...  Formal verification of concurrency errors in JavaScript web applications This page intentionally left blank The impact of import on economic growth: Evidence from China A log ontology learning approach  ... 
doi:10.1201/b18660-165 fatcat:jzfm3mzjp5eodi5gltayr4i544

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data

Weizhi Meng, Wenjuan Li, Chunhua Su, Jianying Zhou, Rongxing Lu
2018 IEEE Access  
He was a Post-Doctoral Fellow with the University of Waterloo from 2012 to 2013.  ...  He is also the Steering Committee Chair of ACM Asia CCS and steering committee member of Asiacrypt.  ... 
doi:10.1109/access.2017.2772294 fatcat:dobvxdunizfmna6is3lurcsxpu

Challenges of Fully Homomorphic Encryptions for the Internet of Things

Licheng WANG, Jing LI, Haseeb AHMAD
2016 IEICE transactions on information and systems  
Acknowledgements This work was supported by the National Natural Science Foundation of China (NSFC) (Nos. 61370194, 61411146001, 61502048).  ...  Manuscript publicized May 31, 2016. † The authors are with State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.  ...  At Asiacrypt 2010, Stehlé and Steinfeld [48] introduced an optimization by using a probabilistic decryption algorithm that can be implemented by a multiplicative algebraic circuit with low orders.  ... 
doi:10.1587/transinf.2015ini0003 fatcat:zx3mj3425fbb5exactwj4sm3fm

Towards Practical Lattice-Based One-Time Linkable Ring Signatures [chapter]

Carsten Baum, Huang Lin, Sabine Oechsner
2018 Lecture Notes in Computer Science  
In Advances in Cryptology -ASIACRYPT 2012, pages 663-680, 2012. KTX08. Akinori Kawachi, Keisuke Tanaka, and Keita Xagawa.  ...  In Theory of Cryptography -14th International Conference, TCC 2016-B, Beijing, China, October 31 -November 3, 2016, Proceedings, Part I, pages 554-581, 2016. Lyu08. Vadim Lyubashevsky.  ... 
doi:10.1007/978-3-030-01950-1_18 fatcat:ymdodcwgvzeutgenjzqi4g4omu

Accelerating the Search of Differential and Linear Characteristics with the SAT Method

Ling Sun, Wei Wang, Meiqin Wang
2021 IACR Transactions on Symmetric Cryptology  
In Information Security and Cryptology -7th International Conference, Inscrypt 2011, Beijing, China, November 30 -December 3, 2011. Revised Selected Papers, pages 57-76, 2011.  ...  In Advances in Cryptology -ASIACRYPT 2017 -23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I  ... 
doi:10.46586/tosc.v2021.i1.269-315 fatcat:sfdtcdt3cbhdjmoozh5qjasawy

Heuristic Algorithm for Efficient Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments

A. Porselvi, S.Brindha Devi
2015 International Journal of Computer Applications Technology and Research  
ACISP, 2012, vol. [26] T. Okamoto and K. Takashima, "Fully secure unbounded inner-product and attribute-based encryption," in Proc. ASIACRYPT, 2012, vol. 7. [27] V. Goyal, A. Jain, O.  ...  Beijing: Tsinghua University Press. 2006. 1. INTRODUCTION There are many application of MANET.  ... 
doi:10.7753/ijcatr0405.1001 fatcat:7xpnnpep5vd7hcrmcjr4fvpnq4

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+35 others)
2017 International Journal of Network Security   unpublished
Acknowledgments The work in this paper has been supported by National Natural Science Foundation of China (61272500), National High-tech R&D Program (863 Program) (2015AA017204) and Beijing Natural Science  ...  Acknowledgments This work is supported by the Liaoning Provincial Natural Science Foundation of China (Grant No. 201602680).  ...  He is currently a professor in the School of Software Engineering at Beijing Uni- versity of Technology (BJUT) in Beijing, China. Prior to joining BJUT in 2003, Prof.  ...