电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN918":
276 Liu Huanping①②; Ji Zhenzhou; Hu Mingzeng; Fang Binxing; Yang Yixian
  A Daynamic (k,n)-threshold secret sharing scheme based on discrete logarithm
    JEIT   2002 Vol.24 (2): 276-279 [Abstract] (1665) [HTML 1 KB] [PDF 404 KB] (876)
1377 Zhang Putai①②; Zhang Fangguo; Wang Yumin
  AN EFFICIENT ELECTRONIC AUCTION SCHEME BASED ON SECRET SHARING AND SIGNCRYPTION
    JEIT   2001 Vol.23 (12): 1377-1383 [Abstract] (1624) [HTML 1 KB] [PDF 1523 KB] (545)
1190 Wang Changjie; Zhang Fangguo; Wang Yumin
  IMPROVEMENT UPON PUBLIC KEY CERTIFICATION SYSTEM
    JEIT   2001 Vol.23 (11): 1190-1194 [Abstract] (1407) [HTML 1 KB] [PDF 1094 KB] (502)
833 Mao Qiong; Chen Mingqi; Xia Guangsheng; Yang Yixian; Tan Tieniu
  THE RESEARCH OF SECURE DIGITAL WATERMARKING ARCHITECTURE
    JEIT   2001 Vol.23 (9): 833-840 [Abstract] (1735) [HTML 1 KB] [PDF 1719 KB] (619)
841 Du Weizhang; Wang Xinmei
  AN IDENTIFICATION SCHEME BASED ON PARITY CHECK MATRIX OF RANK DISTANCE CODES OVER GF(qN)
    JEIT   2001 Vol.23 (9): 841-846 [Abstract] (1574) [HTML 1 KB] [PDF 1038 KB] (580)
533 Zhang Jianzhong①②; Xiao Guozhen
  THE CONSTRUCTIONS OF AUTHENTICATION CODES WITH HASHING
    JEIT   2001 Vol.23 (6): 533-539 [Abstract] (1691) [HTML 1 KB] [PDF 1073 KB] (464)
321 Tang Shaohua; Wei Gang
  ID-Based Interactive User Authentication Schemes Using Digital Signature
    JEIT   2001 Vol.23 (4): 321-326 [Abstract] (1640) [HTML 1 KB] [PDF 1192 KB] (544)
408 Yin Yuanzhao
  A New Way to Secue Communication via Chaotic Syncronization
    JEIT   2001 Vol.23 (4): 408-412 [Abstract] (1724) [HTML 1 KB] [PDF 718 KB] (521)
60 Chen Lusheng; Fu Fangwei
  CRYPTOGRAPHIC PROPERTIES OF COMPOSITE MULTI-OUTPUT FEEDFORWARD FUNCTIONS
    JEIT   2001 Vol.23 (1): 60-67 [Abstract] (1435) [HTML 1 KB] [PDF 1374 KB] (617)
824 Liu Shengli; Zheng Dong; Wang Yumin
  FINDING SECURE ELLIPTIC CURVES OVER GF(2n) AND THEIR BASE POINTS
    JEIT   2000 Vol.22 (5): 824-830 [Abstract] (1677) [HTML 1 KB] [PDF 1066 KB] (578)
831 Xu Chengqian
  RECURSIVE CONSTRUCTIONS BASED ON SPECIAL ARRAYS FOR THE FAMILIES OF BENT COMPLEMENTARY FUNCTIONS
    JEIT   2000 Vol.22 (5): 831-835 [Abstract] (1446) [HTML 1 KB] [PDF 639 KB] (553)
858 Shao Zuhua
  DISCUSSION ON "SECURITY AND PERFORMANCE ANALYSIS OF TWO KINDS OF ELGAMAL SIGNATURE SCHEMES
    JEIT   2000 Vol.22 (5): 858-864 [Abstract] (2060) [HTML 1 KB] [PDF 1205 KB] (547)
579 Zheng Dong; Wang Changjie; Wang Yumin
  A MODIFIED BAN-LOGIC
    JEIT   2000 Vol.22 (4): 579-584 [Abstract] (1447) [HTML 1 KB] [PDF 1058 KB] (494)
505 Song Ronggong; Hu Zhengming; Yang Yixian
  THE INVESTIGATION OF THE FRESHNESS IN BAN LOGIC
    JEIT   2000 Vol.22 (3): 505-508 [Abstract] (1584) [HTML 1 KB] [PDF 793 KB] (461)
509 Wang Yongchuan; Li Zichen; Yang Yixian
  A SECRET KEY DISTRIBUTIONS SCHEME BASED ON THE THEORY OF ALGEBRAIC SEMIGROUPS
    JEIT   2000 Vol.22 (3): 509-512 [Abstract] (1758) [HTML 1 KB] [PDF 830 KB] (425)
194 Yang Bo; Wang Yumin
  A KEY ESCROW SYSTEM FOR NETWORK ENVIRONMENT BASED ON RSA ALGORITHM
    JEIT   2000 Vol.22 (2): 194-197 [Abstract] (1417) [HTML 1 KB] [PDF 796 KB] (598)
198 Lin Bogang; Qiu Hongduan
  THE CONSTRUCTION AND REALIZATION OF D=3 SM ARRAY CODES FOR HIGH-DIMENSION
    JEIT   2000 Vol.22 (2): 198-204 [Abstract] (1400) [HTML 1 KB] [PDF 1307 KB] (563)
73 Zheng Dong; Tian Jianbo; Wang Yumin
  A NOTE ON THE AUGMENTATION OF BAN-LIKE LOGICS
    JEIT   2000 Vol.22 (1): 73-77 [Abstract] (1612) [HTML 1 KB] [PDF 736 KB] (537)
84 Liu Shengli; Yang Bo; Wang Yumin
  A VOTING PROTOCOL BASED ON ELLIPTIC CURVE CRYPTOSYSTEMS
    JEIT   2000 Vol.22 (1): 84-89 [Abstract] (1416) [HTML 1 KB] [PDF 1367 KB] (634)
104 Sun Xiaorong; Wang Yumin
  SECURE AUTHENTICATION AND KEY DISTRIBUTION PROTOCOLS FOR INTERNET/INTRANET ENVIRONMENT
    JEIT   2000 Vol.22 (1): 104-111 [Abstract] (1386) [HTML 1 KB] [PDF 1659 KB] (682)
160 Feng Dengguo
  CHARACTERIZATION OF THE DIFFERENCE DISTRIBUTION TABLE OF OTHOGONAL SYSTEM
    JEIT   2000 Vol.22 (1): 160-161 [Abstract] (1684) [HTML 1 KB] [PDF 366 KB] (521)
162 Kang Baoyuan; Wang Yumin
  ORTHOGONAL SYSTEM OF POLYNOMIALS IN n INDETERMINATES OVER FINITE FIELDS
    JEIT   2000 Vol.22 (1): 162-164 [Abstract] (1638) [HTML 1 KB] [PDF 462 KB] (556)
833 Sun Xiaorong; Wang Yumin
  A THRESHOLD KEY ESCROW SYSTEM BASED ON RSA
    JEIT   1999 Vol.21 (6): 833-837 [Abstract] (1582) [HTML 1 KB] [PDF 930 KB] (535)
646 He Zhenya; Li Ke; Yang Luxi
  CHAOTIC MAP BINARY SEQUENCES WITH GOOD SECURITY
    JEIT   1999 Vol.21 (5): 646-651 [Abstract] (1658) [HTML 1 KB] [PDF 1300 KB] (776)
660 Ma Wenping; Wang Xinmei
  A CONSTRUCTION FOR UNCONDITIONALLY SECURE AUTHENTICATION CODES WITH ARBITRATION OBTAINED FROM COMBINATORIAL DESIGNS
    JEIT   1999 Vol.21 (5): 660-664 [Abstract] (1582) [HTML 1 KB] [PDF 1101 KB] (611)
718 Yang Bo; Wang Yumin
  KEY ESCROW BASED ON ASMUTH-BLOOM THRESHOLD SYSTEM
    JEIT   1999 Vol.21 (5): 718-720 [Abstract] (1597) [HTML 1 KB] [PDF 555 KB] (617)
494 Liu Jianwei; Wang Yumin
  AUTHENTICATION PROTOCOL FOR MOBILE USER REGISTRATION IN PERSONAL COMMUNICATION SYSTEMS
    JEIT   1999 Vol.21 (4): 494-499 [Abstract] (1416) [HTML 1 KB] [PDF 1224 KB] (506)
511 Sun Xiaorong; Wang Yumin
  DESIGN OF SOFTWARE KEY ESCROW SYSTEM
    JEIT   1999 Vol.21 (4): 511-515 [Abstract] (1710) [HTML 1 KB] [PDF 1119 KB] (524)
516 Zhang Jianzhong; Xiao Guozhen
  A THRESHOLD SECRET SHARING SCHEME TO IDENTIFY CHEATERS
    JEIT   1999 Vol.21 (4): 516-521 [Abstract] (1393) [HTML 1 KB] [PDF 1127 KB] (516)
561 Liu Huanping; Yang Yixian; Yang Fangchun
  MULTISTAGE SECRET SHARING BASED ON ONE-WAY FUNCTION
    JEIT   1999 Vol.21 (4): 561-564 [Abstract] (1739) [HTML 1 KB] [PDF 413 KB] (608)
First page | Prev page | Next page | Last pagePage 10 of 11, 326 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech