×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [12]
内容类型
期刊论文 [6]
会议论文 [4]
学位论文 [2]
发表日期
2019 [3]
2018 [1]
2015 [1]
2012 [1]
2011 [2]
2010 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Research on secure routing technology based on NDN for VANET
会议论文
Hong Kong, Hong kong, June 1, 2019 - June 3, 2019
作者:
Gai, Xiaowei
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/15
Cryptography
Distributed computer systems
Dynamics
Floods
Memory architecture
Mobile security
Mobile telecommunication systems
Network architecture
Network routing
Signal processing
Transmission control protocol
Vehicular ad hoc networks
Data network
Forward-secure
Identity based cryptography
Named data networkings
Network environments
Security requirements
Trust values
Wireless mobile networks
MPR Based Secure Content Routing Scheme for NDN-MANET
期刊论文
JOURNAL OF INTERNET TECHNOLOGY, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2020/02/24
Named data networking
MANET
Merkle tree
Secure content routing
MPR based secure content routing scheme for NDN-MANET
期刊论文
Journal of Internet Technology, 2019, 卷号: 20, 期号: 5, 页码: 1625-1636
作者:
Guo, Xian
;
Zhang, Ma-Jiang
;
Ngaboyindekwe, Aristide
;
Fang, Jun-Li
;
Wang, Jing
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/11/14
Authentication
Floods
Forestry
Mobile ad hoc networks
Network security
Trees (mathematics)
Content routing
MANET
Merkle trees
Named data networkings
Security attributes
Security mechanism
Source authentication
Statistical detection
基于MPR的NDN-MANET网络安全内容路由机制研究
学位论文
2018
作者:
张马江
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/11/05
命名数据网络
移动自组织网络
Merkle树
安全内容路由
Secure Network Coding-Based Named Data Network Mutual Anonymity communication Protocol
会议论文
作者:
Feng Tao
;
Xing Fei
;
Lu Ye
;
Fang Jun Li
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/15
NDN
mutual anonymity
anonymous routing
network coding
authentication mechanism
Coding-aware secure routing for multi-hop wireless networks
期刊论文
Tongxin Xuebao/Journal on Communications, 2012, 卷号: 33, 期号: 6, 页码: 133-142
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhan-Ting
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Codes (symbols)
Formal methods
Location
Network coding
Network routing
Wireless networks
DCAR
Distributed coding
Dynamic topologies
Multihop wireless network
Secure routing
Security issues
Security properties
Wireless broadcast
An efficient and provably secure multi-path Distance Vector Routing
期刊论文
Journal of Computational Information Systems, 2011, 卷号: 7, 期号: 5, 页码: 1638-1647
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhanting
;
Ma, Jianfeng
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Ad hoc networks
Algorithms
Mobile ad hoc networks
Mobile telecommunication systems
Routing protocols
Acknowledgement mechanism
Ad hoc on demand distance vector
Digital Signature
Distance vector routing
Error checks
Mathematical method
Mobile ad hoc
Multi-path
Multiple-path
Network configuration
Node-disjoint paths
Provably secure
Secure routing
Security requirements
Trusted systems
移动Ad Hoc网络安全路由协议设计与分析技术研究
学位论文
2011
作者:
郭显
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/11/05
移动Ad Hoc网络
路由协议
通用可复合安全
协议复合逻辑安全
网络编码
Provably secure approach for multiple node-disjoint paths source routing protocol
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2010, 卷号: 21, 期号: 7, 页码: 1717-1731
作者:
Feng, Tao
;
Guo, Xian
;
Ma, Jian-Feng
;
Li, Xing-Hua
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Ad hoc networks
Authentication
Mobile ad hoc networks
Multipath propagation
Network routing
Routing protocols
Topology
Message authentication codes
Multi-path routing schemes
Multipath routing protocols
Multiple nodes
Plausible route
Provably security
Source routing protocols
Universally Composable Security
The hierarchical threat model of routing security for wireless ad hoc networks
会议论文
作者:
Xian, Guo
;
Tao, Feng
;
Yuan, Zhan-Ting
;
Ma, Jian-Feng
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/11/15
Ad hoc networks
Distributed computer systems
Network routing
Attacker models
Communication capabilities
Communication path
Dolev-Yao threat model
Provable security
Routing security
Security analysis
Threat modeling
©版权所有 ©2017 CSpace - Powered by
CSpace