×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
武汉大学 [6]
华南理工大学 [5]
山东大学 [3]
大连理工大学 [2]
北京航空航天大学 [2]
上海大学 [2]
更多...
内容类型
会议论文 [29]
发表日期
2018 [2]
2017 [1]
2014 [1]
2011 [1]
2010 [3]
2009 [4]
更多...
学科主题
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共29条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Collaborative filtering-based matching and recommendation of suppliers in prefabricated component supply chain
会议论文
International Conference on Applications and Techniques in Cyber Security and Intelligence, ATCSI 2017, 2017-06-16
作者:
Du, Juan[1]
;
Jing, Hengqing[2]
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/22
CIPA: Concurrent IC and PCB Authentication Using On-Chip Ring Oscillator Array
会议论文
2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018-01-01
作者:
Han, Yueying
;
Wang, Xiaoxiao
;
Tehranipoor, Mark
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Supply Chain Security
Counterfeit
Sensor
DOST: Dynamically Obfuscated Wrapper for Split Test against IC Piracy
会议论文
PROCEEDINGS OF THE 2017 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2017-01-01
作者:
Wang, Xiaoxiao
;
Guo, Yueyu
;
Ramhan, Tauhid
;
Zhang, Dongrong
;
Tehranipoor, Mark
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
IC Piracy
Overproduction
Counterfeit
Supply Chain Security
Transportation system security under raining environment
会议论文
2014 4th International Conference of Logistics Engineering and Management: System Planning, Supply Chain Management, and Safety, ICLEM 2014, October 9, 2014 - October 11, 2014
作者:
Wang, Chao
;
Liu, Zhaohui
;
Jin, Lu
;
Sun, Kaiwen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
Security improvement in RFID supply chain
会议论文
2011 International Conference on Internet Technology and Applications, iTAP 2011, August 16, 2011 - August 18, 2011
作者:
Jun, Li
;
Jun, Wen
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/31
RFID隐私与安全中的关键技术研究
会议论文
2006国际RFID技术高峰论坛会论文集, Proceedings of 2006 International RFID Technology Summit Forum, 2006国际RFID技术高峰论坛会, 2006 International RFID Technology Summit Forum, 中国北京, CNKI, 亚太RFID技术协会
彭皓
;
李泉林
;
Hao Peng
;
Quan-Lin Li
收藏
  |  
浏览/下载:5/0
An improved authentication approach to enhance security and privacy in RFID system
会议论文
2010 2nd International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2010, Nanjing, China, August 26, 2010 - August 28, 2010
作者:
Chen, Xiaoyun
;
Su, Youli
;
Xiong, Hui
;
Yao, Yukai
;
Liu, Guohua
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2017/01/18
Security of data
Authentication
Cybernetics
Radio frequency identification (RFID)
Radio systems
Supply chain management
Supply chains
Wireless telecommunication systems
Hash lock
Mutual authentication
Random-list
RFID
Security and privacy
Research on knowledge exchange duopoly game model of supply chain enterprise based on the cournot model
会议论文
2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010, Wuhan, Hubei, 2010-04-24
作者:
Ma J.
;
Yu H.-G.
;
Yang D.-L.
;
Wu Y.
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/24
A New Approach of Modern Supply Chain Management Electronic Supply Management Based on Information Lifecycle Management
会议论文
作者:
Ma Feicheng
;
Zhan Guoliang
;
Lu Tao
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
procurement
Supply Chain Management
Information Llifecycle Management
e-Procurement
e-Supply Management
A New Approach of Modern Supply Chain Management Electronic Supply Management Based on Information Lifecycle Management
会议论文
作者:
Ma Feicheng
;
Zhan Guoliang
;
Lu Tao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
procurement
Supply Chain Management
Information Llifecycle Management
e-Procurement
e-Supply Management
©版权所有 ©2017 CSpace - Powered by
CSpace