不依赖双线性对的带关键字搜索的无证书公钥加密方案构造

Y Lu, J Li, AY Lu, AJ Li - Frontiers, 2019 - jzus.zju.edu.cn
It offers a perfect cryptographic solution to encrypted data … Certificateless cryptography (CLC)
is a novel cryptographicEfficiency comparison and the simulation show that it enjoys better …

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击INSTITUTE OF SCIENCE AND TECHNOLOGY

BONS CRYPTOGRAPHY - 2012 - itu.edu.tr
… RFID technology provides wireless communication with an object or someone to identify or
… Second, this thesis includes an implementation of a real RFID system which is efficient and …

在多跳MIMO 通信系统下的基于物理层安全的协作波束赋形设计

S Gong, C Xing, Z Fei, J Kuang - Science China Information Sciences, 2016 - Springer
… frequency efficiency and system capacity of wireless networks… (MIMO) technology is widely
accepted as an effective way to … encryption technique at source is proposed for SIMO network, …

[PDF][PDF] 6G 无线内生安全理念与构想

金梁, 楼洋明, 孙小丽, 钟州, 许晓明… - … vision of 6G wireless …, 2023 - scis.scichina.com
… of communication/security/service, security efficiency can be … on physical layer chain key
for encryption and authenti- … and concepts of 6G wireless networks; proposes the application …

[图书][B] 电子信息科学专业英语导读教程

郝红尉 - 2005 - books.google.com
… This was more efficient in a number … encryption algorithm, such as DES; others -such as
programmable digital signal processors are capable of implementing many encryption algorithms

元宇宙技术综述

王文喜, 周芳, 万月亮, 宁焕生 - 工程科学学报, 2022 - cje.ustb.edu.cn
… and summarized the opinions of practitioners, experts, and scholars about it. Second, it
outlined the key technologies of the metaverse, including network and operating technology (5G, …

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击GRADUATE SCHOOL

T BILEN - 2022 - polen.itu.edu.tr
communication are used to provide cellular network service and solve the problems observed
in satellite communication… air network has been proposed as a new effective technique

[引用][C] TTrraannssttrrppaaoonnrrssllppssooyyrrssll 矾矾lleerr1100nnnnttyyaaiinnnnddgg

闲闲锍锍, 髯髯肆肆受受霞霞曷曷

EdgeKeeper: 一种适应泛在电力物联网的可信边缘计算框架

W Yang, W Liu, X Wei, Z Guo, K Yang… - … Information Technology …, 2021 - Springer
… the safe operation level, efficiency of power grid, work quality, … the edge of network operators
such as cellular network base … obtain a certificate, an encryption certificate, and a remote …

TrustChain: 具有可信执行环境的隐私保护智能合约模型⋆

F Wu, A Ye, Y Diao, Y Zhang, J Chen… - Available at SSRN … - papers.ssrn.com
… the low computing power and cannot support high-intensity computing. Encryption algorithms
will … In this paper, we propose an efficient and confidential smart contract scheme that takes …