• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Gong, Bei (Gong, Bei.) (学者:公备) | Liu, Xian-Gang (Liu, Xian-Gang.) | Zhuang, Jun-Xi (Zhuang, Jun-Xi.)

收录:

EI Scopus PKU CSCD

摘要:

In order to prevent a malicious terminal of a group identifying itself and group fraud to others, in this paper, a TPM identification scheme based on threshold policy is presented. Its security is based on computational DH problem (CDHP) and K-CAA problem, which can effectively prevent a malicious terminal of a group identifying itself and group fraud to others. The scheme also fully takes into account the limited computing power of TPM to enhance its computing efficiency.

关键词:

Crime Engineering Research

作者机构:

  • [ 1 ] [Gong, Bei]College of Computer Science, Beijing University of Technology, Beijing 100124, China
  • [ 2 ] [Liu, Xian-Gang]College of Computer Science, Beijing University of Technology, Beijing 100124, China
  • [ 3 ] [Zhuang, Jun-Xi]College of Computer Science, Beijing University of Technology, Beijing 100124, China

通讯作者信息:

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

Journal of Beijing University of Technology

ISSN: 0254-0037

年份: 2010

期: SUPPL. 2

卷: 36

页码: 40-42

被引次数:

WoS核心集被引频次:

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

在线人数/总访问数:330/2900994
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司