Zobrazeno 1 - 10
of 41
pro vyhledávání: '"D. J. Guan"'
Autor:
Albert Guan, D. J. Guan
Publikováno v:
IEEE Access, Vol 8, Pp 179047-179054 (2020)
Smart grid is a modern electric power grid designed to improve efficiency and reliability of the production and distribution of electric power. In a smart grid, smart meters continuously generate electric power consumption data and send it to the ser
Externí odkaz:
https://doaj.org/article/13ecbdab254c4af8a7062a13294ae2c8
Publikováno v:
DSC
We show that invalid signatures generated by attackers may be complex, and these signatures are difficult to detect. The detecting method which is widely used now may not detect such invalid signatures with a small probability. In this paper, we use
Publikováno v:
Quantum Information Processing. 13:2355-2374
Recently, Hwang et al. proposed two three-party authenticated quantum key distribution protocols for two communicating parties to establish a session key via a trusted center. They also showed their protocols were secure by using random oracle model.
Publikováno v:
Journal of Network and Computer Applications. 34:12-19
In recent years, vehicle theft has become an increasing problem worldwide. A staggering number of cars are stolen every year, and up to half of these are never recovered. Thus, vehicle ownership identification is an important security issue. In this
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Computers. 56:234-242
We propose a new strategy to improve the performance of multicomputations, such as computing xA + yB in an additive group or a xby in a multiplicative group. This new strategy is called asynchronous strategy. In each iteration, it tries to compute pa
Publikováno v:
Applied Mathematics and Computation. 167:108-117
Multiexponentiation, for the 2-dimension one especially, is a very important but time-consuming operation in many ElGamal-like public key cryptosystems. An efficient multiexponentiation method is firstly proposed by Shamir in ElGamal's paper. Shamir'
Publikováno v:
Communications in Algebra. 30:551-562
T. Moh invented the cryptosystem, Tame Transformation Method, abbreviated as TTM. Its encryption and decryption are very fast due to the general properties of tame automorphisms and small finite fields. The success of the system relies on the constru
Publikováno v:
Journal of Systems and Software. 55:321-328
Consider the case that a large document including different subjects can be decomposed into a disjoint set of subdocuments and is to be delegated to a group of signatories with different knowledge domains for signing. Based on the intractability of t