Trust-management framework in open network
Xin Luo;义先 杨;正明 胡;Zhi Yuan Su
2009-2 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
3
被引量Two-way user authentication scheme based on ElGamal digital signature
Hui Min Qiu;义先 杨;正明 胡;Xi Zeng Zhou
2005-6 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
3
被引量DCT-based image hiding algorithm
Guangsheng Xia;Mingqi Chen;义先 杨;正明 胡
2001-12 Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology
2
被引量A Novel ID-Based Verifiably Encrypted Signature without Random Oracle
Xiao Long Ma;Wei Cui;利泽 谷;义先 杨;正明 胡
2008
2
被引量Efficient ID-based TPM key loading scheme for trusted platform
Cheng Song;Bing Liu;正明 胡;Yang Xin;义先 杨;Han Yin
2010-8 Journal of China Universities of Posts and Telecommunications
2
被引量A strong multi-designated verifiers signature scheme
Bo Yang;Zibi Xiao;义先 杨;正明 胡;Xinxin Niu
2008-6 Frontiers of Electrical and Electronic Engineering in China
2
被引量Controllable delegation model based on usage and trustworthiness
Xin Luo;义先 杨;正明 胡
2008
2
被引量Optimistic fair multi-party non-repudiation protocol
Suoyun Deng;Aifen Sui;正明 胡;义先 杨
2002-12 Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology
2
被引量Improved direct anonymous attestation scheme
Cheng Song;Yu Qiong Sun;Wei Ping Peng;守山 罗;Yang Xin;正明 胡
2011-6 Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications
2
被引量Host identity based one-time key exchange protocol in trusted computing
Miao Zhang;Guo Ai Xu;正明 胡;义先 杨
2007-6 Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology
1
被引量