×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [39]
内容类型
会议论文 [24]
期刊论文 [15]
发表日期
2019 [2]
2016 [1]
2014 [2]
2012 [8]
2010 [4]
2009 [17]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共39条,第1-10条
帮助
限定条件
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Security analysis of a public key authenticated encryption with keyword search scheme
会议论文
14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2018, November 26, 2018 - November 28, 2018
作者:
Wu, Tsu-Yang
;
Chen, Chien-Ming
;
Wang, King-Hang
;
Wu, Jimmy Ming-Tai
;
Pan, Jeng-Shyang
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/31
On the security of a three factor remote user authentication scheme using fuzzy extractor
会议论文
14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2018, November 26, 2018 - November 28, 2018
作者:
Chen, Chien-Ming
;
Huang, Yanyu
;
Deng, Xiaoting
;
Wu, Tsu-Yang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
A novel CDMA based high performance reversible data hiding scheme
期刊论文
IH and MMSec 2016 - Proceedings of the 2016 ACM Information Hiding and Multimedia Security Workshop, 2016, 页码: 39-44
作者:
Ma B.
;
Xu J.
;
Shi Y.Q.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/16
Code division multiple access (CDMA)
Embedding capacity
Location-map
Prediction-error
Reversible data hiding
Security monitoring by watermarking and hashing for multimedia service on internet platform
会议论文
10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014, 27 August 2014 through 29 August 2014
作者:
Wang, Zi
;
Liu, Ju
;
Wan, Wenbo
;
Sun, Jiande
;
Bo, Jun
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
copy detection
copyright protection
security monitoring
video hash
Security Monitoring by Watermarking and Hashing for Multimedia Service on Internet Platform
会议论文
10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), AUG 27-29, 2014
作者:
Wang, Zi
;
Liu, Ju
;
Wan, Wenbo
;
Sun, Jiande
;
Bo, Jun
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
watermark
video hash
copy detection
security monitoring
copyright
protection
A multi-objective genetic algorithm based on simulated annealing
期刊论文
Proceedings - 2012 4th International Conference on Multimedia and Security, MINES 2012, 2012, 页码: 413-416
作者:
Tang, Xin-Hua
;
Chang, Xu
;
Fang, Zhi-Feng
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/23
Genetic algorithm
Multi-objective genetic algorithm
Non-inferior solution
Simulated annealing algorithm
A group-tree matching algorithm based on forwarding tag maximum match
期刊论文
Proceedings - 2012 4th International Conference on Multimedia and Security, MINES 2012, 2012, 页码: 27-30
作者:
Zhou, Yanling
;
Zhu, Youqin
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/23
Aggregated multicast
Forwarding tag
Group-tree matching
Multicast tree cost
Design and implementation of Lightweight Wireless Lan Intrusion Detection System
期刊论文
Proceedings - 2012 4th International Conference on Multimedia and Security, MINES 2012, 2012, 页码: 75-78
作者:
Wu, Jian
;
Fang, Zhi-Feng
;
Cao, Yong
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/23
Anomaly detection
Detection of attack density
Intrusion detection
Misuse detection
WLAN
A Multi-objective Genetic Algorithm Based on Simulated Annealing
会议论文
4th International Conference on Multimedia Information Networking and Security (MINES), NOV 02-04, 2012
作者:
Tang Xin-hua
;
Chang Xu
;
Fang Zhi-feng
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
Simulated annealing algorithm
Multi-objective genetic algorithm
genetic algorithm
non-inferior solution
Design and Implementation of Lightweight Wireless Lan Intrusion Detection System
会议论文
4th International Conference on Multimedia Information Networking and Security (MINES), NOV 02-04, 2012
作者:
Wu Jian
;
Fang Zhi-feng
;
Cao Yong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
WLAN
intrusion detection
misuse detection
anomaly detection
detection of attack density
©版权所有 ©2017 CSpace - Powered by
CSpace