We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-9 of 9 results
  1. A new group-oriented publicly veriablethreshold signcryption scheme

    Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes, it is found that the improved scheme can...

    Shangdi Chen, Guangxu Bian in Journal of Electronics (China)
    Article 14 December 2013
  2. A quantum multiple access communications scheme using orbital angular momentum

    We propose a quantum multiple access communications scheme using Orbital Angular Momentum (OAM) sector states in the paper. In the scheme, each user...

    **aoliang Dong, Shengmei Zhao, Baoyu Zheng in Journal of Electronics (China)
    Article 20 March 2013
  3. Performance of a new decoding method used in open-loop all-optical chaotic communication system

    A new decoding method with decoder is used in open-loop all-optical chaotic communication system under strong injection condition. The performance of...

    Huijie Liu, Jiuchao Feng in Journal of Electronics (China)
    Article 01 January 2011
  4. Self-certified multi-proxy signature schemes with message recovery

    Multi-proxy signature schemes allow the original signer to delegate his/her signing power to n proxy signers such that all proxy signers must...

    Tzong-sun Wu, Chien-lung Hsu, Han-yu Lin in Journal of Zhejiang University-SCIENCE A
    Article 01 February 2009
  5. Cryptanalysis of an image encryption scheme based on the Hill cipher

    This paper studies the security of an image encryption scheme based on the Hill cipher (Ismail et al. , 2006) and reports its following problems: (1)...

    Cheng-qing Li, Dan Zhang, Guan-rong Chen in Journal of Zhejiang University-SCIENCE A
    Article 01 August 2008
  6. Comments on “How to repair the Hill cipher”

    A modification of the Hill cipher algorithm was recently proposed by Ismail et al. (2006), who claimed that their new scheme could offer more security...

    Y. Rangel-Romero, R. Vega-García, ... F. Rodríguez-Henríquez in Journal of Zhejiang University SCIENCE A
    Article 01 February 2008
  7. A new labeling search algorithm for Bit-Interleaved Coded Modulation with Iterative Decoding

    Bit-Interleaved Coded Modulation with Iterative Decoding (BICM-ID) is a bandwidth efficient transmission, where the bit error rate is reduced through...

    Zou Xuelan, Feng Guangzeng in Journal of Electronics (China)
    Article 01 January 2008
  8. Multiple hashes of single key with passcode for multiple accounts

    A human’s e-life needs multiple offline and online accounts. It is a balance between usability and security to set keys or passwords for these...

    Lee Kok-wah, Ewe Hong-tat in Journal of Zhejiang University-SCIENCE A
    Article 01 July 2007
  9. Protection of mobile location privacy by using blind signature

    Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can...

    Liao Jian, Qi Ying-hao, ... Li Sheng-hong in Journal of Zhejiang University-SCIENCE A
    Article 01 June 2006
Did you find what you were looking for? Share feedback.