CORC

浏览/检索结果: 共48条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Authentication Technology in Industrial Control System Based on Identity Password 会议论文
Shenyang, China, July 27-29, 2020
作者:  Yang LY(杨路瑶);  Shang WL(尚文利);  Chen CY(陈春雨);  Wang TY(王天宇);  Liu ZB(刘周斌)
收藏  |  浏览/下载:3/0  |  提交时间:2020/10/10
Identity authentication with signature verification 会议论文
11th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2019, April 28, 2019 - April 29, 2019
作者:  Zhao, Yongjian
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/31
In Mobile Internet Era, How To Open "Smart Identity Authentication" 会议论文
PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON POLITICS, ECONOMICS AND LAW (ICPEL 2017), 2017-01-01
作者:  Wu, Ying[1]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/24
Idology and Its Applications in Public Security and Network Security 会议论文
INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017), 2017-01-01
作者:  Su, Shenghui;  Zheng, Jianhua;  Lu, Shuwang;  Huang, Zhiqiu;  Li, Zhoujun
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/30
An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks 会议论文
作者:  Feng, Tao;  Zhao, Ming-Tao
收藏  |  浏览/下载:5/0  |  提交时间:2019/11/15
Practical Identity-Based Authentication Protocol for Ad-hoc Networks 会议论文
7th IEEE International Conference on Software Engineering and Service Science (ICSESS), China Hall Sci & Technol, Beijing, PEOPLES R CHINA
作者:  Feng, Boang;  Liu, Jianwei
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/30
Practical Identity-Based Authentication Protocol for Ad-hoc Networks 会议论文
PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016-01-01
作者:  Feng, Boang;  Liu, Jianwei
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/30
An Efficient Identity-Based Signature Scheme for Vehicular Communications 会议论文
11th International Conference on Computational Intelligence and Security (CIS), Shenzhen, PEOPLES R CHINA, 2015-01-01
作者:  Zhang, Yaling;  Yang, Liang;  Wang, Shangping
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/20
Identity-Based Linearly Homomorphic Signature Scheme from Lattice 会议论文
INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015-01-01
作者:  Wang, Shang-Ping;  Di, Wei-Biao;  Deng, Yin-Juan
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/20
A Study of Privacy Improvement Using A Randomized Blind Signature Scheme in Vehicular Networks 会议论文
12th IEEE Int Conf Ubiquitous Intelligence & Comp/12th IEEE Int Conf Autonom & Trusted Comp/15th IEEE Int Conf Scalable Comp & Commun & Associated Workshops/IEEE Int Conf Cloud & Big Data Comp/IEEE Int Conf Internet People, Beijing, PEOPLES R CHINA, 2015-08-10
作者:  Liu Zhe;  Liu Jianwei
收藏  |  浏览/下载:2/0  |  提交时间:2020/01/06


©版权所有 ©2017 CSpace - Powered by CSpace