×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [12]
内容类型
期刊论文 [7]
会议论文 [5]
发表日期
2018 [1]
2017 [1]
2014 [1]
2011 [5]
2010 [1]
2008 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
专题:兰州理工大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network
期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 52248-52260
作者:
Feng, Xiaoqin
;
Ma, Jianfeng
;
Feng, Tao
;
Miao, Yinbin
;
Liu, Ximeng
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/15
Outsourcing feature extraction
consortium chain
smart contract
DAC
sharding technique
D2D communication
Incipient fault detection and condition monitoring of rolling bearings by using the Mahalanobis-Taguchi System
期刊论文
Zhendong yu Chongji/Journal of Vibration and Shock, 2017, 卷号: 36, 期号: 12, 页码: 155-162 and 188
作者:
Yan, Changfeng
;
Zhu, Tao
;
Wu, Lixiao
;
Ahmed, Y Y
;
Guo, Jianfeng
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Condition monitoring
Correlation methods
Fault detection
Testing
Vibration analysis
Accelerated life tests
Degradation condition
Incipient fault detection
Incipient faults
Mahalanobis distances
Mahalanobis-taguchi systems
Performance degradation
Rolling bearings
Photocatalytic reduction synthesis of SrTiO3-graphene nanocomposites and their enhanced photocatalytic activity
期刊论文
NANOSCALE RESEARCH LETTERS, 2014, 卷号: 9, 期号: 1, 页码: 1-9
作者:
Xian, Tao
;
Yang, Hua
;
Di, Lijing
;
Ma, Jinyuan
;
Zhang, Haimin
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/11/15
SrTiO3-graphene nanocomposites
Photocatalysis
Photocatalytic mechanism
An efficient and provably secure multi-path Distance Vector Routing
期刊论文
Journal of Computational Information Systems, 2011, 卷号: 7, 期号: 5, 页码: 1638-1647
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhanting
;
Ma, Jianfeng
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Ad hoc networks
Algorithms
Mobile ad hoc networks
Mobile telecommunication systems
Routing protocols
Acknowledgement mechanism
Ad hoc on demand distance vector
Digital Signature
Distance vector routing
Error checks
Mathematical method
Mobile ad hoc
Multi-path
Multiple-path
Network configuration
Node-disjoint paths
Provably secure
Secure routing
Security requirements
Trusted systems
Preparation and Photocatalytic Performance of Nano-bismuth Ferrite with Tunable Size
期刊论文
CHINESE JOURNAL OF CATALYSIS, 2011, 卷号: 32, 期号: 4, 页码: 618-623
作者:
Xian Tao
;
Yang Hua
;
Dai Jianfeng
;
Wei Zhiqiang
;
Ma Jinyuan
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/15
bismuth ferrite
nanoparticle
polyacrylamide gel method
grain-size tailoring
photocatalysis
methyl orange
Formal modeling and analysis in a logic for mobile Ad Hoc networks
期刊论文
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2011, 卷号: 41, 期号: 2, 页码: 258-265
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhanting
;
Ma, Jianfeng
收藏
  |  
浏览/下载:59/0
  |  
提交时间:2020/11/14
Ad hoc networks
Computation theory
Computer circuits
Mobile ad hoc networks
Mobile security
Network security
Semantics
Correctness properties
Formal modeling and analysis
Logic
Logic of secure systems
Mobile iP
Network evolution
Physical locations
Wireless broadcast
Security random network coding model against byzantine attack based on CBC
会议论文
作者:
Tao, Feng
;
Bingtao, Zhang
;
Jianfeng, Ma
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Codes (symbols)
Network coding
Byzantine attacks
Cipher-block-chaining
Random network coding
Secure networks
Secure authenticated key agreement protocol for WMEN based on protocol composition logic
会议论文
作者:
Feng, Tao
;
Yi, Yangfan
;
Ma, Jianfeng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/11/15
Authentication
Computer crime
Public key cryptography
Authentication key agreement protocols
Forward-secure
Protocol composition logic
Protocol derivation systems
WMEN
Changeable threshold signature scheme based on lattice theory
会议论文
作者:
Feng, Tao
;
Gao, Yongguo
;
Ma, Jianfeng
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/15
Authentication
e-government
Lattice theory
Polynomials
Lattice
NTRUSign
Polynomial multiplication
Secret sharing
Secret sharing schemes
Signature algorithms
Threshold signature
Threshold signature schemes
A new approach for UC security concurrent deniable authentication
期刊论文
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 卷号: 51, 期号: 4, 页码: 352-367
作者:
Feng Tao
;
Li FengHua
;
Ma JianFeng
;
Moon, SangJae
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/11/15
information security
concurrent deniable authentication
universally composable
verifiably smooth projective hashing
the decisional composite residuosity assumption
©版权所有 ©2017 CSpace - Powered by
CSpace