×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [11]
软件研究所 [9]
北京航空航天大学 [5]
贵州大学 [4]
西安理工大学 [4]
浙江工商大学 [3]
更多...
内容类型
会议论文 [48]
发表日期
2020 [1]
2019 [1]
2017 [3]
2016 [2]
2015 [4]
2014 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共48条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Authentication Technology in Industrial Control System Based on Identity Password
会议论文
Shenyang, China, July 27-29, 2020
作者:
Yang LY(杨路瑶)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Wang TY(王天宇)
;
Liu ZB(刘周斌)
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/10/10
Industrial control security
digital signature
identity authentication
SSL/TLS handshake protocol
Identity authentication with signature verification
会议论文
11th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2019, April 28, 2019 - April 29, 2019
作者:
Zhao, Yongjian
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/31
In Mobile Internet Era, How To Open "Smart Identity Authentication"
会议论文
PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON POLITICS, ECONOMICS AND LAW (ICPEL 2017), 2017-01-01
作者:
Wu, Ying[1]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/24
mobile Internet
multifactor authentication
digital signature
device fingerprint
face recognition
Idology and Its Applications in Public Security and Network Security
会议论文
INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017), 2017-01-01
作者:
Su, Shenghui
;
Zheng, Jianhua
;
Lu, Shuwang
;
Huang, Zhiqiu
;
Li, Zhoujun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Idology
Symmetric identity
Asymmetric identity
Identification
Anti-fraud
Digital signature
Hash function
United verification platform
An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks
会议论文
作者:
Feng, Tao
;
Zhao, Ming-Tao
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/11/15
Practical Identity-Based Authentication Protocol for Ad-hoc Networks
会议论文
7th IEEE International Conference on Software Engineering and Service Science (ICSESS), China Hall Sci & Technol, Beijing, PEOPLES R CHINA
作者:
Feng, Boang
;
Liu, Jianwei
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/30
Identity-Based cryptography
ad-hoc
authentication
signature
encryption
Practical Identity-Based Authentication Protocol for Ad-hoc Networks
会议论文
PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016-01-01
作者:
Feng, Boang
;
Liu, Jianwei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Identity-Based cryptography
ad-hoc
authentication
signature
encryption
An Efficient Identity-Based Signature Scheme for Vehicular Communications
会议论文
11th International Conference on Computational Intelligence and Security (CIS), Shenzhen, PEOPLES R CHINA, 2015-01-01
作者:
Zhang, Yaling
;
Yang, Liang
;
Wang, Shangping
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/20
anonymous authentication
Identity-based signature
privacy
revocation
vehicular communications
Identity-Based Linearly Homomorphic Signature Scheme from Lattice
会议论文
INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015-01-01
作者:
Wang, Shang-Ping
;
Di, Wei-Biao
;
Deng, Yin-Juan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/20
Lattice
Homomorphic
Signature
A Study of Privacy Improvement Using A Randomized Blind Signature Scheme in Vehicular Networks
会议论文
12th IEEE Int Conf Ubiquitous Intelligence & Comp/12th IEEE Int Conf Autonom & Trusted Comp/15th IEEE Int Conf Scalable Comp & Commun & Associated Workshops/IEEE Int Conf Cloud & Big Data Comp/IEEE Int Conf Internet People, Beijing, PEOPLES R CHINA, 2015-08-10
作者:
Liu Zhe
;
Liu Jianwei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/06
blind signature
identity protection
unlinkability
unforgeability
©版权所有 ©2017 CSpace - Powered by
CSpace