A novel verifiable dynamic multi-policy secret sharing scheme
Feng Wang;利泽 谷;Shihui Zheng;义先 杨;正明 胡
2010
5
被引量Research of an innovative P2P-based botnet
Gao Jian;Kang Feng Zheng;义先 杨;正明 胡
2010
4
被引量ID-based transitive signature schemes without random oracle
Xiao Long Ma;利泽 谷;Wei Cui;义先 杨;正明 胡
2010-5 Tongxin Xuebao/Journal on Communications
4
被引量Construction of the one-off public key based on identity
Sheng Zhang;Guo Ai Xu;正明 胡;义先 杨
2006-8 Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology
4
被引量Research of large-scale network-based adaptive intrusion response model
Dai Fei Guo;义先 杨;正明 胡
2004-2 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
4
被引量TM-RMRP
Shuai Zeng;Yang Xin;义先 杨;正明 胡
2010
4
被引量A secure proxy blind signature scheme based on ECDLP
Lanlan Hu;Kangfeng Zheng;正明 胡;义先 杨
2009
3
被引量A verifiable multi-policy secret sharing scheme
Feng Wang;利泽 谷;Shi Hui Zheng;义先 杨;正明 胡
2010-12 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
3
被引量New visual cryptography algorithm to hide a two-color image in a single shared image
Guang Sheng Xia;Zhong Lan Yuan;义先 杨;正明 胡
2002-9 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
3
被引量Electronic cash scheme based on elliptic curve cryptosystem
Man Chun Cai;义先 杨;正明 胡
2004-4 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
3
被引量