×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [4]
兰州理工大学 [4]
北京航空航天大学 [2]
自动化研究所 [1]
武汉大学 [1]
内容类型
期刊论文 [7]
其他 [3]
会议论文 [2]
发表日期
2015 [12]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
发表日期:2015
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A Security and Privacy Review of VANETs
期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 卷号: 16, 期号: 6, 页码: 2985-2996
作者:
Qu, Fengzhong
;
Wu, Zhihui
;
Wang, Fei-Yue
;
Cho, Woong
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2016/01/18
VANETs
security
privacy
survey
RESEARCH ON ALGORITHM OF ROBUST SPEECH PERCEPTUAL HASHING FOR TIME-FREQUENCY DOMAIN BASED ON HILBERT TRANSFORM
期刊论文
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2015, 卷号: 11, 期号: 4, 页码: 1191-1204
作者:
Zhang, Qiuyu
;
Yang, Zhongping
;
Zhang, Qianyun
;
Huang, Yibo
;
Xing, Pengfei
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2022/03/01
Speech content authentication
Perceptual hashing
Hilbert transform
Low-pass filter
Tamper localization
Research on algorithm of robust speech perceptual hashing for time-frequency domain based on hilbert transform
期刊论文
International Journal of Innovative Computing, Information and Control, 2015, 卷号: 11, 期号: 4, 页码: 1191-1204
作者:
Zhang, Qiuyu
;
Yang, Zhongping
;
Zhang, Qianyun
;
Huang, Yibo
;
Xing, Pengfei
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Audio signal processing
Authentication
Discrete cosine transforms
Frequency domain analysis
Low pass filters
Speech
White noise
Hashing algorithms
Hilbert transform
Perceptual feature
Perceptual hashing
Speech content
Tamper localization
Time frequency domain
White Gaussian Noise
An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition
期刊论文
Journal of Information Hiding and Multimedia Signal Processing, 2015, 卷号: 6, 期号: 2, 页码: 311-322
作者:
Zhang, Qiu-Yu
;
Xing, Peng-Fei
;
Huang, Yi-Bo
;
Dong, Rui-Hong
;
Yang, Zhong-Ping
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Authentication
Discrete cosine transforms
Image coding
Robustness (control systems)
Speech
Wavelet analysis
Wavelet decomposition
Authentication algorithm
Givens Rotation
Perceptual hashing
Speech content
Two dimensional discrete cosine transform
Wavelet packet coefficient
Wavelet Packet Decomposition
Wavelet packet decompositions
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
期刊论文
INFORMATION SCIENCES, 2015
Wang, Ding
;
Wang, Nan
;
Wang, Ping
;
Qing, Sihan
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
User anonymity
De-synchronization
Random oracle model
WIRELESS SENSOR NETWORKS
KEY AGREEMENT PROTOCOL
SMART-CARDS
PASSWORD AUTHENTICATION
MUTUAL AUTHENTICATION
MOBILE NETWORKS
ROBUST
EXCHANGE
ENHANCEMENT
CRYPTANALYSIS
On the Usability of Two-Factor Authentication
其他
2015-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
Two-factor authentication
Usability
User anonymity
SMART-CARD
PASSWORD AUTHENTICATION
SCHEME
Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication
其他
2015-01-01
Kumar, Vireshwar
;
Li, He
;
Park, Jung-Min
;
Bian, Kaigui
;
Yang, Yaling
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Privacy-preserving authentication
group signature
probabilistic revocation
Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards
其他
2015-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
Offline dictionary attack
Smart card
Common memory device
Non-tamper resistant
USER AUTHENTICATION
KEY EXCHANGE
SECURITY ENHANCEMENT
EFFICIENT
ROBUST
IMPROVEMENTS
PROTOCOL
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 卷号: 10, 期号: 12
作者:
He, Debiao
;
Zeadally, Sherali
;
Xu, Baowen
;
Huang, Xinyi
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Authentication
bilinear pairing
elliptic curve
vehicular ad-hoc networks
Flexible and Robust Privacy-Preserving Implicit Authentication
会议论文
30th IFIP TC 11International Information Security and Privacy Conference (SEC), Univ Hamburg, Hamburg, GERMANY, 2015-01-01
作者:
Domingo-Ferrer, Josep
;
Wu, Qianhong
;
Blanco-Justicia, Alberto
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/06
Privacy-preserving implicit authentication
Privacy-preserving set intersection
Implicit authentication
Active authentication
Transparent authentication
Risk mitigation
Data brokers
©版权所有 ©2017 CSpace - Powered by
CSpace