Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (7): 1884-1889.DOI: 10.11772/j.issn.1001-9081.2014.07.1884
Previous Articles Next Articles
YANG Chao1,2,ZHANG Hongqi1,2,YANG Zhi2,3,SHAN Dibin2,3
Received:
2014-01-13
Revised:
2014-02-27
Online:
2014-07-01
Published:
2014-08-01
Contact:
YANG Chao
通讯作者:
杨超
作者简介:
基金资助:
国家973计划项目;国家863计划项目;信息保障技术重点实验室开放基金资助项目
CLC Number:
YANG Chao ZHANG Hongqi YANG Zhi SHAN Dibin. Radio frequency identification group proof protocol based on secret key-sharing tree[J]. Journal of Computer Applications, 2014, 34(7): 1884-1889.
杨超 张红旗 杨智 单棣斌. 基于秘密共享密钥树的无线射频识别组证明协议[J]. 计算机应用, 2014, 34(7): 1884-1889.
[1]ZHANG Z, XU Q. Universal composable grouping-proof protocol for RFID tags in the Internet of things[J]. Chinese Journal of Computers, 2011,34(7):1188-1194.(张忠, 徐秋亮. 物联网环境下UC安全的组证明RFID协议[J]. 计算机学报, 2011,34(7):1188-1194.) |
[1] | . Key Rcovery Attack of Blow-CAST-Fish Based on Differential Tables [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | . Deep robust watermarking algorithm based on multiscale knowledge learning [J]. Journal of Computer Applications, 0, (): 0-0. |
[3] | . Adaptively secure outsourced attribute-based encryption with keyword search [J]. Journal of Computer Applications, 0, (): 0-0. |
[4] | SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei. Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing [J]. Journal of Computer Applications, 2021, 41(10): 2893-2899. |
[5] | WU Guangfu, WANG Yingjun. Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing [J]. Journal of Computer Applications, 2021, 41(10): 2885-2892. |
[6] | . Efficient robust zero watermarking algorithm for 3D medical images based on ray-casting sampling and quaternion orthogonal moments [J]. Journal of Computer Applications, 0, (): 0-0. |
[7] | XU Liyun, YAN Tao, QIAN Yuhua. Audio encryption algorithm in fractional domain based on cascaded chaotic system [J]. Journal of Computer Applications, 2021, 41(9): 2623-2630. |
[8] | CHEN Hengheng, NI Zhiwei, ZHU Xuhui, JIN Yuanyuan, CHEN Qian. Differential privacy high-dimensional data publishing method via clustering analysis [J]. Journal of Computer Applications, 2021, 41(9): 2578-2585. |
[9] | ZHANG Yongbin, CHANG Wenxin, SUN Lianshan, ZHANG Hang. Detection method of domains generated by dictionary-based domain generation algorithm [J]. Journal of Computer Applications, 2021, 41(9): 2609-2614. |
[10] | GE Jihong, SHEN Tao. Energy data access control method based on blockchain [J]. Journal of Computer Applications, 2021, 41(9): 2615-2622. |
[11] | ZHANG Shipeng, LI Yongzhong, DU Xiangtong. Intrusion detection model based on semi-supervised learning and three-way decision [J]. Journal of Computer Applications, 2021, 41(9): 2602-2608. |
[12] | . Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | . Nonlinear scrambling diffusion synchronization image encryption based on dynamic network [J]. Journal of Computer Applications, 0, (): 0-0. |
[14] | CHEN Weiwei, CAO Li, GU Xiang. E-forensics model for internet of vehicles based on blockchain [J]. Journal of Computer Applications, 2021, 41(7): 1989-1995. |
[15] | QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao. Blockchain storage expansion model based on Chinese remainder theorem [J]. Journal of Computer Applications, 2021, 41(7): 1977-1982. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||