×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [35]
武汉大学 [33]
清华大学 [24]
软件研究所 [24]
重庆大学 [21]
大连理工大学 [16]
更多...
内容类型
期刊论文 [271]
发表日期
2021 [2]
2019 [9]
2018 [16]
2017 [26]
2016 [15]
2015 [18]
更多...
学科主题
Computer S... [2]
Computer S... [2]
Computer S... [1]
Computer S... [1]
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共271条,第1-10条
帮助
限定条件
内容类型:期刊论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:
Yongxia Shi
;
Ehsan Nekouei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2024/03/18
Cyber-security
encrypted control
event-triggered control (ETC)
networked control systems (NCSs)
semi-homomorphic encryption
Content-adaptive image encryption with partial unwinding decomposition
期刊论文
SIGNAL PROCESSING, 2021, 卷号: 181, 页码: 14
作者:
Wu, Yongfei
;
Zhang, Liming
;
Qian, Tao
;
Liu, Xilin
;
Xie, Qiwei
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2021/03/29
Information security
Image encryption
Image-content-adaptive encryption
Partial unwinding decomposition
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
作者:
Liu, Zhen
;
Pan, Yanbin
;
Xie, Tianyuan
收藏
  |  
浏览/下载:57/0
  |  
提交时间:2020/10/12
decoding
public key cryptography
quantum cryptography
computational complexity
optimisation
cyclic codes
IND-CPA security
NIST PQC project
hamming quasicyclic cryptosystem
code-based key encapsulation mechanism
NIST standardisation process
public-key encryption scheme
IND-CCA2 secure KEM
revised scheme HQC- beta
HQC cryptosystem
s-DQCSD problem
s-decision quasi-cyclic syndrome decoding
plaintext attack
Linear space-variant optical cryptosystem via Fourier ptychography
期刊论文
OPTICS LETTERS, 2019, 卷号: 44, 期号: 8, 页码: 2032-2035
作者:
Pan, An
;
Wen, Kai
;
Yao, Baoli
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2019/05/15
A KIND OF DESIGN OF KNAPSACK PUBLIC KEY CRYPTOSYSTEM BASED ON CHAOTIC SYSTEM
期刊论文
UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2019, 卷号: 81, 期号: 2, 页码: 165-176
作者:
Deng, Zhijuan
;
Zhong, Shaojun
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/08/22
Cryptography
Chaos
Information Security
Threshold Method
A novel chaotic system and its application in a color image cryptosystem
期刊论文
OPTICS AND LASERS IN ENGINEERING, 2019, 卷号: 121, 页码: 479-494
作者:
Wang, Mingxu
;
Wang, Xingyuan
;
Zhang, Yingqian
;
Zhou, Shuang
;
Zhao, Tingting
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2019/12/02
Chaotic system
Power-exponential structure
Color image cryptosystem
Confusion and diffusion
Security analysis
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image
期刊论文
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2019, 卷号: 16, 期号: 3
作者:
Tang, Zhenjun
;
Xu, Shijie
;
Ye, Dengpan
;
Wang, Jinyan
;
Zhang, Xianquan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/05
Reversible data hiding
Homomorphic cryptosystem
Additive homomorphism
Histogram shifting
Real-time application
An Efficient and Secure Smart Card Based Authentication Scheme
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 4, 页码: 1113-1123
作者:
Chen, Chien-Ming
;
Xiang, Bin
;
Wang, King-Hang
;
Zhang, Yong
;
Wu, Tsu-Yang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/11
Authentication key agreement
Biometric
Elliptic-curve cryptosystem
Smart card
BAN logic
Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code
期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 卷号: 13, 期号: 2, 页码: 1100-1123
作者:
Han, Mu[1]
;
Wang, Yunwen[2]
;
Ma, Shidian[3]
;
Wan, Ailan[4]
;
Liu, Shuai[5]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/24
QD-MDPC code
McEliece cryptosystem
DPA attack
Masking scheme
©版权所有 ©2017 CSpace - Powered by
CSpace