[PDF][PDF] 信息安全综述

沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武 - 2007 - metc.hactcm.edu.cn
摘要21 世纪是信息的时代. 信息成为一种重要的战略资源, 信息的获取, 处理和安全保障能力
成为一个国家综合国力的重要组成部分. 信息安全事关国家安全, 事关社会稳定. 因此 …

Crop Selection Method to maximize crop yield rate using machine learning technique

R Kumar, MP Singh, P Kumar… - … conference on smart …, 2015 - ieeexplore.ieee.org
Agriculture planning plays a significant role in economic growth and food security of agro-
based country. Se-lection of crop (s) is an important issue for agriculture planning. It …

A forward-secure public-key encryption scheme

R Canetti, S Halevi, J Katz - … 2003: International Conference on the Theory …, 2003 - Springer
Cryptographic computations are often carried out on insecure devices for which the threat of
key exposure represents a serious and realistic concern. In an effort to mitigate the damage …

Security proofs for identity-based identification and signature schemes

M Bellare, C Namprempre, G Neven - Journal of Cryptology, 2009 - Springer
This paper provides either security proofs or attacks for a large number of identity-based
identification and signature schemes defined either explicitly or implicitly in existing …

Efficient and provably-secure identity-based signatures and signcryption from bilinear maps

PSLM Barreto, B Libert, N McCullagh… - Advances in Cryptology …, 2005 - Springer
In this paper we describe a new identity-based signcryption (IBSC) scheme built upon
bilinear maps. This scheme turns out to be more efficient than all others proposed so far. We …

RFID-tags for anti-counterfeiting

P Tuyls, L Batina - Cryptographers' track at the RSA conference, 2006 - Springer
RFID-tags are becoming very popular tools for identification of products. As they have a
small microchip on board, they offer functionality that can be used for security purposes. This …

Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography

X Boyen - Annual international cryptology conference, 2003 - Springer
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography
that does not require principals to pre-compute key pairs and obtain certificates for their …

Efficient identity-based signatures secure in the standard model

KG Paterson, JCN Schuldt - Australasian conference on information …, 2006 - Springer
The only known construction of identity-based signatures that can be proven secure in the
standard model is based on the approach of attaching certificates to non-identity-based …

[PDF][PDF] Proxy Cryptography Revisited.

AA Ivan, Y Dodis - NDSS, 2003 - Citeseer
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various
proxy functions allow two cooperating parties F (the “FBI”) and P (the “proxy”) to duplicate …

Ratcheted encryption and key exchange: The security of messaging

M Bellare, AC Singh, J Jaeger, M Nyayapati… - Advances in Cryptology …, 2017 - Springer
We aim to understand, formalize and provably achieve the goals underlying the core key-
ratcheting technique of Borisov, Goldberg and Brewer, extensions of which are now used in …